How to find potentially vulnerable GNU inet-utils telnetd servers on your network

|
Updated

Latest GNU inet-utils telnetd server vulnerability #

Simon Josefsson has reported a vulnerability in the the GNU inet-utils telnetd server. GNU inet-utils (InetUtils) is a collection of Internet-related servers and utilities. It is most commonly deployed on Linux systems. 

GNU telnetd contains an authentication bypass vulnerability in its handling of user-supplied environment variables. A specially crafted $USER environment variable can bypass authentication and allow a remote, unauthenticated attacker to access a vulnerable system with the privileges of any known user, including root.

Note that no CVE is assigned at this time.

The following versions are affected

  • GNU inet-utils telnetd versions 1.9.3 and higher

What is telnetd? #

GNU inet-utils telnetd provides a server for the standard Telnet protocol. Telnet is a legacy remote-access protocol similar that has been largely supplanted by SSH and other, more secure, protocols. However, Telnet is still widely used in low-power or legacy devices.

What is the impact? #

Successful exploitation of this vulnerability would allow an adversary to bypass authentication on a vulnerable host.

Are updates or workarounds available? #

There is currently no patched version available. Users are advised to disable telnet access if possible, and to ensure proper network access controls are in place.

How to find potentially vulnerable systems with runZero #

From the Asset inventory, use the following query to locate potentially vulnerable assets:

os:Linux protocol:telnet

Note that this query will locate all Telnet services running on Linux hosts; GNU inet-utils telnetd is the most common Telnet server deployed on Linux systems, but this query may discover other telnet servers as well.

Written by Rob King

Rob King is the Director of Applied Research at runZero. Over his career Rob has served as a senior researcher with KoreLogic, the architect for TippingPoint DVLabs, and helped get several startups off the ground. Rob helped design SC Magazine's Data Leakage Prevention Product of the Year for 2010, and was awarded the 3Com Innovator of the Year Award in 2009. He has been invited to speak at BlackHat, Shmoocon, SANS Network Security, and USENIX.

More about Rob King
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.