CVE-2022-39028
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
telnetd en GNU Inetutils versiones hasta 2.3, MIT krb5-appl versiones hasta 1.0.3, y trabajos derivados presenta una desreferencia de puntero NULL por medio de 0xff 0xf7 o 0xff 0xf8. En una instalación típica, la aplicación telnetd sería bloqueada pero el servicio telnet seguiría estando disponible mediante inetd. Sin embargo, si la aplicación telnetd presenta muchos bloqueos en un intervalo de tiempo corto, el servicio telnet dejará de estar disponible después de que inetd registre un error "telnet/tcp server failing (looping), service terminated". NOTA: MIT krb5-appl no está soportado por la corriente principal, pero está incluido en algunas distribuciones de Linux. El código afectado fue retirado del producto MIT Kerberos 5 (aka krb5) soportado hace muchos años, en versión 1.8
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-30 CVE Reserved
- 2022-08-30 CVE Published
- 2024-04-20 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/11/msg00033.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://git.hadrons.org/cgit/debian/pkgs/inetutils.git/commit/?id=113da8021710d871c7dd72d2a4d5615d42d64289 | 2023-09-27 |
URL | Date | SRC |
---|---|---|
https://lists.gnu.org/archive/html/bug-inetutils/2022-08/msg00002.html | 2023-09-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Inetutils Search vendor "Gnu" for product "Inetutils" | <= 2.3 Search vendor "Gnu" for product "Inetutils" and version " <= 2.3" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Kerberos 5 Search vendor "Mit" for product "Kerberos 5" | <= 1.0.3 Search vendor "Mit" for product "Kerberos 5" and version " <= 1.0.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Netkit-telnet Project Search vendor "Netkit-telnet Project" | Netkit-telnet Search vendor "Netkit-telnet Project" for product "Netkit-telnet" | <= 0.17 Search vendor "Netkit-telnet Project" for product "Netkit-telnet" and version " <= 0.17" | - |
Affected
|