Telnetd - Remote Code Execution (CVE-2020-10188)

critical Nessus Plugin ID 136890

Synopsis

The remote telnetd service is affected by a buffer overflow vulnerability that could lead to remote code execution.

Description

A buffer overflow condition exists in telnetd due to incorrect bounds checks in the services handling of short writes and urgent data. An unauthenticated, remote attacker can exploit this, via specially crafted telnet packets, to execute arbitrary code on the remote server.

Solution

Refer to your vendor advisory regarding this issue.

See Also

http://www.nessus.org/u?0a5d3bf5

Plugin Details

Severity: Critical

ID: 136890

File Name: telnetd_cve-2020-10188_direct.nasl

Version: 1.7

Type: remote

Family: Misc.

Published: 5/26/2020

Updated: 12/5/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-10188

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:netkit_telnet_project:netkit_telnet

Exploit Ease: No known exploits are available

Patch Publication Date: 3/6/2020

Vulnerability Publication Date: 3/6/2020

Reference Information

CVE: CVE-2020-10188

IAVA: 2020-A-0293