Question: Can or should Mandrake 6.0 users install security patches from
Red Hat, such as the one that was released this morning? The notice
follows:
Red Hat, Inc. Security Advisory
Package
in.telnetd
Synopsis
Denial of service attack in in.telnetd
Advisory ID
RHSA-1999:029-01
Issue Date
1999-08-19
Updated on
Keywords
telnet telnetd
1. Topic:
A denial of service attack has been fixed in in.telnetd.
2. Bug IDs fixed:
4560
3. Relevant releases/architectures:
Red Hat Linux 6.0, all architectures
4. Obsoleted by:
None
5. Conflicts with:
None
6. RPMs required:
Intel:
ftp://updates.redhat.com/6.0/i386/
telnet-0.10-29.i386.rpm
Alpha:
ftp://updates.redhat.com/6.0/alpha
telnet-0.10-29.alpha.rpm
SPARC:
ftp://updates.redhat.com/6.0/sparc
telnet-0.10-29.sparc.rpm
Source:
ftp://updates.redhat.com/6.0/SRPMS
telnet-0.10-29.src.rpm
Architecture neutral:
ftp://updates.redhat.com/6.0/noarch/
7. Problem description:
in.telnetd attempts to negotiate a compatible terminal type between the
local and remote host.
By setting the TERM environment variable before connecting, a remote
user could cause the
system telnetd to open files it should not. Depending on the TERM
setting used, this could lead
to denial of service attacks.
Thanks go to Michal Zalewski and the Linux Security Audit team for
noting this vulnerability.
8. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh
where filename is the name of the RPM.
9. Verification:
MD5 sum Package Name
-------------------------------------------------------------------------
4360d47490f13d60b8737d28dc88825a i386/telnet-0.10-29.i386.rpm
90213fcdca41a3ed12ab7d92344e7286 alpha/telnet-0.10-29.alpha.rpm
277787dbc39dff8ea84d4b16dcb7a954 sparc/telnet-0.10-29.sparc.rpm
269783a0754d234f7bef0f4717a8dbc2 SRPMS/telnet-0.10-29.src.rpm
These packages are also PGP signed by Red Hat Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig filename
If you only wish to verify that each package has not been corrupted or
tampered with, examine
only the md5sum with the following command:
rpm --checksig --nopgp filename
10. References:
Erik Gellatly
Salem, Oregon