Netkit.Telnetd.IAC.Buffer.Overflow

description-logoDescription

This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in netclear and nextitem functions for Netkit telnetd 0.17.
The vulnerability is caused by an error when the vulnerable software handles a specially crafted packet. It allows a remote attacker to execute arbitrary code.

affected-products-logoAffected Products

Netkit telnetd up to 0.17
PAN-OS 8.1 versions earlier than 8.1.20
PAN-OS 9.0 versions earlier than 9.0.14
PAN-OS 9.1 versions earlier than 9.1.9
PAN-OS 10.0 versions earlier than 10.0.6

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://security.paloaltonetworks.com/CVE-2020-10188
For Fedora 30 operating system, please update telnet-server to 0.17-77.fc30:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3VJ6V2Z3JRNJOBVHSOPMAC76PSSKG6A/
For Fedora 31 operating system, please update telnet-server to 0.17-78.fc31:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7FMTRRQTYKWZD2GMXX3GLZV46OLPCLVK/
For Fedora 32 operating system, please update telnet-server to 0.17-79.fc32
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLU6FL24BSQQEB2SJC26NLJ2MANQDA7M/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-05-06 15.838 Default_action:pass:drop
2020-05-06 15.837 Default_action:drop:pass
2020-05-06 15.836 Default_action:pass:drop
2020-04-27 15.828