[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[cobalt-security] Telnetd Exploit
- Subject: [cobalt-security] Telnetd Exploit
- From: Jeff Lovell <jlovell@xxxxxxx>
- Date: 25 Jul 2001 18:25:21 -0700
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
Recently there was a telnetd exploit that was posted to Bugtraq. The
following products seem to be exposed to this vulnerability: RaQ1, RaQ2,
RaQ3, CacheRaQ1, CacheRaQ2, Qube1, and Qube2. At the current moment
there is not a known exploit for linux, but as we all know, this is just
a matter of time.
Below are some experimental RPMS that address this issue. They are
being tested by our SQA group, and should be officially available by the
end of the week. In the mean time, here are the RPMS that are being
tested by the SQA group for those of you that are willing to give them a
try.
i386 (RaQ3):
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/telnet-0.16-6.i386.rpm
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/telnet-server-0.16-6.i386.rpm
md5:
b145d682d1008da9c9e3a4000c5ae92f telnet-0.16-6.i386.rpm
915539a6f453149ef949dfd02c44b00b telnet-server-0.16-6.i386.rpm
mips:
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/telnet-0.16-6.mips.rpm
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/telnet-server-0.16-6.mips.rpm
md5:
44c1dc83eb73505036d6ade6f1bfa588 telnet-0.16-6.mips.rpm
ba00319165b3adc374aeac73d88c62bf telnet-server-0.16-6.mips.rpm
If you do find any issues with these RPMS, please feel free to contact
me.
Jeff
--
Jeff Lovell
Sun Microsystems Inc.