[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-security] Telnetd Exploit



Recently there was a telnetd exploit that was posted to Bugtraq.  The
following products seem to be exposed to this vulnerability: RaQ1, RaQ2,
RaQ3, CacheRaQ1, CacheRaQ2, Qube1, and Qube2.  At the current moment
there is not a known exploit for linux, but as we all know, this is just
a matter of time.

Below are some experimental RPMS that address this issue.  They are
being tested by our SQA group, and should be officially available by the
end of the week.  In the mean time, here are the RPMS that are being
tested by the SQA group for those of you that are willing to give them a
try.

i386 (RaQ3):
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/telnet-0.16-6.i386.rpm
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/telnet-server-0.16-6.i386.rpm

md5:
b145d682d1008da9c9e3a4000c5ae92f   telnet-0.16-6.i386.rpm
915539a6f453149ef949dfd02c44b00b   telnet-server-0.16-6.i386.rpm

mips:
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/telnet-0.16-6.mips.rpm
ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/telnet-server-0.16-6.mips.rpm

md5:
44c1dc83eb73505036d6ade6f1bfa588   telnet-0.16-6.mips.rpm
ba00319165b3adc374aeac73d88c62bf   telnet-server-0.16-6.mips.rpm

If you do find any issues with these RPMS, please feel free to contact
me.

Jeff
--
Jeff Lovell
Sun Microsystems Inc.