CVE-2022-39028

3 months ago 54

Received


This vulnerability has been received by the NVD and has not been analyzed.

Description

telnetd successful GNU Inetutils done 2.3, MIT krb5-appl done 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 oregon 0xff 0xf8. In a emblematic installation, the telnetd exertion would clang but the telnet work would stay disposable done inetd. However, if the telnetd exertion has galore crashes wrong a abbreviated clip interval, the telnet work would go unavailable aft inetd logs a "telnet/tcp server failing (looping), work terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a fewer Linux distributions. The affected codification was removed from the supported MIT Kerberos 5 (aka krb5) merchandise galore years ago, astatine mentation 1.8.


Severity

CVSS 3.x Severity and Metrics:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD score not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Change History

0 alteration records recovered show changes

Read Entire Article