vendor:
inetutils
by:
None
7.5
CVSS
HIGH
Stack-based and Heap-based Overflow
119
CWE
Product Name: inetutils
Affected Version From: 1.9.4
Affected Version To: 1.9.4
Patch Exists: YES
Related CWE: None
CPE: a:gnu:inetutils:1.9.4
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2015
GNU inetutils <= 1.9.4 telnet.c multiple overflows
GNU inetutils is vulnerable to a stack overflow vulnerability in the client-side environment variable handling which can be exploited to escape restricted shells on embedded devices. Most modern browsers no longer support telnet:// handlers, but in instances where URI handlers are enabled to the inetutils telnet client this issue maybe remotely triggerable. A stack-based overflow is present in the handling of environment variables when connecting telnet.c to remote telnet servers through oversized DISPLAY arguments. A heap-overflow is also present which can be triggered in a different code path due to supplying oversized environment variables during client connection code.
Mitigation:
Add bounds checking to sprintf and malloc calls.