TUCoPS :: BSD :: telnet.htm

FreeBSD telnetd vulnerability
Vulnerability

    telnetd

Affected

    FreeBSD 3.x  (all releases),  FreeBSD 4.x  (all releases  prior to
    4.2), FreeBSD  3.5.1-STABLE prior  to 2000-11-01  and 4.1.1-STABLE
    prior to 2000-10-30

Description

    Following is based on a FreeBSD-SA-00:69 Security Advisory.  This
    was originally found by Jouko Pynnonen.

    telnetd is the server for  the telnet remote login protocol.   The
    telnet protocol allows for UNIX environment variables to be passed
    from the client to the user login session on the server.  However,
    some of these  environment variables have  special meaning to  the
    telnetd  child  process  itself  and  may  be  used  to affect its
    operation.

    Of particular relevance is the  ability for remote users to  cause
    an arbitrary file  on the system  to be searched  for termcap data
    by passing the  TERMCAP environment variable.   Although any  file
    on the local system can be  read since the telnetd server runs  as
    root, the contents of the file will not be reported in any way  to
    the  remote  user  unless  it  contains  a valid termcap entry, in
    which case  the corresponding  termcap sequences  will be  used to
    format the output sent to the client.  It is believed there is  no
    risk of data disclosure through this vulnerability.

    However, an  attacker who  forces the  server to  search through a
    large file  or to  read from  a device  can cause  resources to be
    spent by the server, including CPU cycles and disk read bandwidth,
    which  can  increase  the  server  load  and  may  prevent it from
    servicing  legitimate  user  requests.   Since  the  vulnerability
    occurs  before  the  login(1)  utility  is  spawned,  it  does not
    require authentication to a valid  account on the server in  order
    to exploit.

    Remote users without a valid login account on the server can cause
    resources such  as CPU  and disk  read bandwidth  to be  consumed,
    causing  increased  server  load  and  possibly denying service to
    legitimate users.

Solution

    Disable the telnet service, which  is usually run out of  inetd or
    impose access restrictions using TCP wrappers  (/etc/hosts.allow),
    or a network-level packet filter such as ipfw(8) or ipf(8) on  the
    perimeter firewall or  the local machine,  to limit access  to the
    telnet service to trusted machines.

    Patch:

        ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:69/telnetd.patch.v1.1
        ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:69/telnetd.patch.v1.1.asc

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH