Casinos Not On GamstopNon Gamstop CasinosCasinos Not On GamstopOnline Casinos UKNon Gamstop Casino
20th Nov 2000 [SBWID-217]
COMMAND
	    telnetd
SYSTEMS AFFECTED
	    FreeBSD 3.x  (all releases),  FreeBSD 4.x  (all releases  prior to
	    4.2), FreeBSD  3.5.1-STABLE prior  to 2000-11-01  and 4.1.1-STABLE
	    prior to 2000-10-30
PROBLEM
	    Following is based on a FreeBSD-SA-00:69 Security Advisory.  This
	    was originally found by Jouko Pynnonen.
	    telnetd is the server for  the telnet remote login protocol.   The
	    telnet protocol allows for UNIX environment variables to be passed
	    from the client to the user login session on the server.  However,
	    some of these  environment variables have  special meaning to  the
	    telnetd  child  process  itself  and  may  be  used  to affect its
	    operation.
	    Of particular relevance is the  ability for remote users to  cause
	    an arbitrary file  on the system  to be searched  for termcap data
	    by passing the  TERMCAP environment variable.   Although any  file
	    on the local system can be  read since the telnetd server runs  as
	    root, the contents of the file will not be reported in any way  to
	    the  remote  user  unless  it  contains  a valid termcap entry, in
	    which case  the corresponding  termcap sequences  will be  used to
	    format the output sent to the client.  It is believed there is  no
	    risk of data disclosure through this vulnerability.
	    However, an  attacker who  forces the  server to  search through a
	    large file  or to  read from  a device  can cause  resources to be
	    spent by the server, including CPU cycles and disk read bandwidth,
	    which  can  increase  the  server  load  and  may  prevent it from
	    servicing  legitimate  user  requests.   Since  the  vulnerability
	    occurs  before  the  login(1)  utility  is  spawned,  it  does not
	    require authentication to a valid  account on the server in  order
	    to exploit.
	    Remote users without a valid login account on the server can cause
	    resources such  as CPU  and disk  read bandwidth  to be  consumed,
	    causing  increased  server  load  and  possibly denying service to
	    legitimate users.
SOLUTION
	    Disable the telnet service, which  is usually run out of  inetd or
	    impose access restrictions using TCP wrappers  (/etc/hosts.allow),
	    or a network-level packet filter such as ipfw(8) or ipf(8) on  the
	    perimeter firewall or  the local machine,  to limit access  to the
	    telnet service to trusted machines.
	    Patch:
	
	        ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:69/telnetd.patch.v1.1
	        ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:69/telnetd.patch.v1.1.asc
	
	

Internet highlights