CVE-2026-32772
- EPSS 0.03%
- Veröffentlicht 13.03.2026 21:01:17
- Zuletzt bearbeitet 16.03.2026 18:16:09
telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.
CVE-2026-32746
- EPSS 0.03%
- Veröffentlicht 13.03.2026 17:15:14
- Zuletzt bearbeitet 19.03.2026 14:16:15
telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
CVE-2026-28372
- EPSS 0.01%
- Veröffentlicht 27.02.2026 05:28:17
- Zuletzt bearbeitet 07.03.2026 17:15:51
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDE...
CVE-2026-24061
- EPSS 75.62%
- Veröffentlicht 21.01.2026 06:42:17
- Zuletzt bearbeitet 11.02.2026 15:40:42
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
CVE-2023-40303
- EPSS 0.05%
- Veröffentlicht 14.08.2023 05:15:10
- Zuletzt bearbeitet 21.11.2024 08:19:11
GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is tryin...
CVE-2022-39028
- EPSS 0.37%
- Veröffentlicht 30.08.2022 05:15:08
- Zuletzt bearbeitet 21.11.2024 07:17:24
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain avai...
CVE-2021-40491
- EPSS 0.34%
- Veröffentlicht 03.09.2021 02:15:06
- Zuletzt bearbeitet 21.11.2024 06:24:14
The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.
- EPSS 92.59%
- Veröffentlicht 25.12.2011 01:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to exec...