TELNET: NEW-ENVIRON Overflow
This signature detects attempts to exploit a known vulnerability in telnet clients. The env_opt_add function of some telnet clients incorrectly handles NEWENVIRON sub-options. Attackers can send a maliciously crafted SEND command to a telnet client to overflow the buffer, then execute arbitrary code on the target system with the telnet client account privileges.
Extended Description
Multiple vendors' Telnet client applications are reported prone to a remote buffer-overflow vulnerability. This vulnerability reportedly occurs in the 'env_opt_add()' function in the 'telnet.c' source file, which is apparently common source for all the affected vendors. A remote attacker may exploit this vulnerability to execute arbitrary code on some of the affected platforms in the context of a user that is using the vulnerable Telnet client to connect to a malicious server.
Affected Products
F5 3-dns,Freebsd freebsd
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Sco
Conectiva
Openbsd
Apple
Gentoo
Netkit
Ubuntu
Openwall
Avaya
Debian
Sgi
Trustix
Freebsd
Sun
Suse
Netbsd
Alt_linux
Heimdal
Mit
F5
7.5