Rapid7 Vulnerability & Exploit Database

Sun Patch: SunOS 5.6_x86: /usr/sbin/in.telnetd patch

Back to Search

Sun Patch: SunOS 5.6_x86: /usr/sbin/in.telnetd patch

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/07/2003
Created
07/25/2018
Added
05/03/2006
Modified
10/22/2013

Description

From Sun Patch 106050-05

Sun has released a security patch addressing the following issues:

4225958 in.telnetd core dumps
4798177 in.telnetd is vulnerable to denial of service via TESO
 
(from 106050-04)
 
4483514 in.telnetd vulnerable to buffer overflow ??
4523990 in.telnetd needs some cleanup
4527873 telnetd issues garbage before login prompt if BANNER in use
 
(from 106050-03)
 
4516876 in.telnetd should not accept TTYPROMPT from remote
 
(from 106050-02)
 
4366956 NLSPATH gettext introduces problems when used printf format specifier
4375449 dtmail crashes when calling catgets with NULL default message
 
(from 106050-01)
 
4082063 telnetd BANNER option security problem

Solution(s)

  • sunpatch-solaris-106050

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;