CVE-2020-10188
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
06/03/2020
Last modified:
07/11/2023
Description
utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:netkit_telnet_project:netkit_telnet:*:*:*:*:*:*:*:* | 0.17 (including) | |
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* | 4.20.15 (including) | |
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* | 4.21.0 (including) | 4.21.10m (including) |
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* | 4.22 (including) | 4.22.4m (including) |
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* | 4.23 (including) | 4.23.3m (including) |
cpe:2.3:o:arista:eos:4.24.0f:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:communications_performance_intelligence_center:10.4.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html
- https://github.com/krb5/krb5-appl/blob/d00cd671dfe945791b33d4f1f6a5c57ae1667ef8/telnet/telnetd/utility.c#L205-L216
- https://lists.debian.org/debian-lts-announce/2020/05/msg00012.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00038.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7FMTRRQTYKWZD2GMXX3GLZV46OLPCLVK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HLU6FL24BSQQEB2SJC26NLJ2MANQDA7M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3VJ6V2Z3JRNJOBVHSOPMAC76PSSKG6A/
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telnetd-EFJrEzPx
- https://www.arista.com/en/support/advisories-notices/security-advisories/10702-security-advisory-48
- https://www.oracle.com/security-alerts/cpuApr2021.html