Bug 409 - in.telnetd can be manipulated to permit a root login by a remote user
in.telnetd can be manipulated to permit a root login by a remote user
Status: CLOSED NOTABUG
Product: Red Hat Linux
Classification: Retired
Component: telnet (Show other bugs)
5.1
i386 Linux
high Severity medium
: ---
: ---
Assigned To: David Lawrence
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 1998-12-14 07:53 EST by gort
Modified: 2008-05-01 11:37 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 1998-12-14 09:10:22 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description gort 1998-12-14 07:53:20 EST
We suffered a break in that has been traced to an individual
on a remote host connecting to several of our RedHat Linux
5.0 and 5.1 Intel-based systems.  The connection was via
telnet, and it appears in.telnetd was manipulated to give up
a root shell.  The remote user did not have a legitimate
account on any of our systems.  Redhat 5.0 Alpha systems in
the same lab were not attacked.

Several other Intel based Linux systems (both Redhat and
Slacware) at other sites on campus were succeessfully
attacked at the same time.
Comment 1 Mike Wangsmo 1998-12-14 09:10:59 EST
Before we can be concerned about a security hole, the machines must be
updated to all security errata on updates.redhat.com.  If those
updates have been applied, then please reopen this bug.

Note You need to log in before you can comment on or make changes to this bug.