Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20260312225454.GA26766@openwall.com>
Date: Thu, 12 Mar 2026 23:54:54 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: Justin Swartz <justin.swartz@...ingedge.co.za>,
	Adiel Sol <adiel@...amgroup.com>,
	Collin Funk <collin.funk1@...il.com>
Subject: Re: Remote Pre-Auth Buffer Overflow in GNU Inetutils telnetd (LINEMODE SLC)

On Thu, Mar 12, 2026 at 08:24:42PM +0200, Justin Swartz wrote:
> I would like to draw the community's attention to the following
> vulnerability [1], summarized as "Remote Pre-Auth Buffer Overflow
> in GNU Inetutils telnetd (LINEMODE SLC)", which was reported to
> the bug-inetutils mailing list recently.
> 
> I am not affiliated with the researchers, inetutils, nor GNU/FSF.
> 
> Regards,
> Justin
> 
> ---
> 
> [1] 
> https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html

I'll add that this is maybe part of CVE-2001-0554:

https://nvd.nist.gov/vuln/detail/CVE-2001-0554

"Buffer overflow in BSD-based telnetd telnet daemon on various operating
systems allows remote attackers to execute arbitrary commands via a set
of options including AYT (Are You There), which is not properly handled
by the telrcv function."

https://www.kb.cert.org/vuls/id/745371/

"Multiple vendor telnet daemons vulnerable to buffer overflow via
crafted protocol options"

But I am not entirely sure this specific sub-issue falls under that CVE,
would need to find advisories and patches from back then.

Then there's the telnet client counterpart CVE-2005-0469:

https://nvd.nist.gov/vuln/detail/CVE-2005-0469

"Buffer overflow in the slc_add_reply function in various BSD-based
Telnet clients, when handling LINEMODE suboptions, allows remote
attackers to execute arbitrary code via a reply with a large number of
Set Local Character (SLC) commands."

https://www.kb.cert.org/vuls/id/291924

"Multiple Telnet clients fail to properly handle the "LINEMODE" SLC
suboption"

I'd be surprised if InetUtils telnet client is not affected by this.  It
looks like InetUtils telnet[d] completely lacked security maintenance.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.