Dynamic Linker telnet vulnerability

Risk Level: High risk vulnerability  High

Check or Attack Name: linkerbug

Platforms: IRIX, Linux, FreeBSD, NEC EWS-UX/V, NEC UP-UX/V, NEC UX/4800, NetBSD
Description:

Many telnet daemons offer the functionality of transferring environment variables from one system to the other. On systems that run these daemons and also provide support for shared object libraries, it could be possible to influence the login program called by the telnet daemon. Depending on the system's configuration, either a local or remote attacker could gain root on the affected system.

Remedy:

Determine if your telnet daemon uses the ENVIRON or NEW-ENVIRON options. If your daemon uses these options, you may be vulnerable. Immediately disable the telnet daemon or apply the wrapper provided by CERT until you can obtain a patch from your vendor.

References:

CERT Advisory CA-95.14, Telnetd Environment Vulnerability, http://www.cert.org/advisories/CA-95.14.Telnetd_Environment_Vulnerability.html

Silicon Graphics Inc. Security Advisory 19951101-01-P1010o1020, Telnetd vulnerability reported by MIT, ftp://sgigate.sgi.com/security/19951101-01-P1010o1020


X-Force Logo
Know Your Risks