Bug 1676393 (CVE-2018-20764) - CVE-2018-20764 tcpcrypt: buffer overflow vulnerability leading to privilege escalation
Summary: CVE-2018-20764 tcpcrypt: buffer overflow vulnerability leading to privilege e...
Status: NEW
Alias: CVE-2018-20764
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20190208,repo...
Keywords: Security
Depends On: 1676394 1676395
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-02-12 07:48 UTC by msiddiqu
Modified: 2019-02-18 14:35 UTC (History)
5 users (show)

(edit)
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description msiddiqu 2019-02-12 07:48:54 UTC
A buffer overflow exists in HelpSystems tcpcrypt on Linux, used for BoKS encrypted telnet through BoKS version 6.7.1. Since tcpcrypt is setuid, exploitation leads to privilege escalation.

Comment 1 msiddiqu 2019-02-12 07:49:18 UTC
Created tcpcrypt tracking bugs for this issue:

Affects: epel-7 [bug 1676395]
Affects: fedora-all [bug 1676394]

Comment 3 Salvatore Bonaccorso 2019-02-17 07:31:44 UTC
Is there any specific further information on the issue in tcpcrypt available?

Comment 5 msiddiqu 2019-02-18 09:10:37 UTC
Reference:

https://community.helpsystems.com/knowledge-base/fox-technologies/hotfix/515/ 

Unfortunately, apart from this, we don't have any additional information about the issue.

Comment 6 Salvatore Bonaccorso 2019-02-18 14:35:45 UTC
Hi,

(In reply to msiddiqu from comment #5)
> Reference:
> 
> https://community.helpsystems.com/knowledge-base/fox-technologies/hotfix/515/
> 
> 
> Unfortunately, apart from this, we don't have any additional information
> about the issue.


Thank you. I did not found any corresponding issue furthermore in the tcpcrypt fork on github.


Note You need to log in before you can comment on or make changes to this bug.