First published: Tue Aug 30 2022(Updated: )
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/inetutils | <=2:1.9.4-7+deb10u1 | 2:1.9.4-7+deb10u2 2:2.0-1+deb11u1 2:2.4-2 2:2.4-3 |
ubuntu/inetutils | <2:1.9.4-11ubuntu0.2 | 2:1.9.4-11ubuntu0.2 |
ubuntu/inetutils | <2:2.2-2ubuntu0.1 | 2:2.2-2ubuntu0.1 |
ubuntu/inetutils | <2:2.3-5 | 2:2.3-5 |
GNU inetutils | <=2.3 | |
MIT Kerberos 5 | <=1.0.3 | |
Debian Debian Linux | =10.0 | |
Netkit-telnet Project Netkit-telnet | <=0.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39028 is a vulnerability in telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works.
The severity of CVE-2022-39028 is high with a CVSS score of 7.5.
CVE-2022-39028 affects GNU Inetutils through version 2.3.
CVE-2022-39028 affects MIT krb5-appl through version 1.0.3.
To fix CVE-2022-39028, it is recommended to update to the latest version of GNU Inetutils and MIT krb5-appl.