Bug 152812

Summary: Telnetd Invalid Memory Handling
Product: [Retired] Fedora Legacy Reporter: John Dalbec <jpdalbec>
Component: Package requestAssignee: Fedora Legacy Bugs <bugs>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecified   
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://www.securityfocus.com/advisories/7273
Whiteboard: LEGACY
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description David Lawrence 2005-03-30 23:28:19 UTC
04.40.10 CVE: CAN-2004-0911
Platform: Linux
Title: Debian GNU/Linux Telnetd Invalid Memory Handling
Description: Telnetd, as provided by Debian/GNU Linux, is reportedly
vulnerable to an invalid memory handling issue. This could be used by
attackers to execute arbitrary code on the vulnerable host in the
context of the telnetd process. Versions of telnetd prior to
0.17-18woody1 for the stable branch, and 0.17-26 for the unstable
branch are reported to be affected by this vulnerability.
Ref: http://www.securityfocus.com/advisories/7273



------- Additional Comments From marcdeslauriers 2004-10-12 14:01:32 ----

This doesn't seem applicable to Red Hat's telnet.

http://www.securityfocus.com/archive/1/375743





------- Bug moved to this database by dkl 2005-03-30 18:28 -------

This bug previously known as bug 2154 at https://bugzilla.fedora.us/
https://bugzilla.fedora.us/show_bug.cgi?id=2154
Originally filed under the Fedora Legacy product and Package request component.

Unknown priority P2. Setting to default priority "normal".
Unknown platform PC. Setting to default platform "All".
Setting qa contact to the default for this product.
   This bug either had no qa contact or an invalid one.