Korean
<< Back
VID 14047
Severity 40
Port 23
Protocol TCP
Class TELNET
Detailed Description The telnet server is vulnerable to an authentication bypass vulnerability via the 'USER' environement variable. The telnet daemon (in.telnetd) in Sun Solaris 10 and 11 could allow a remote attacker to bypass authentication, caused by improper validation of the user-supplied 'USER' environement variable. By supplying a specially malformed USER environment variable, a remote attacker could bypass authentication and gain unauthorized access to an affected system with the privileges of an arbitrary user (including the "root" user if the host is configured to accept telnet logins as root).
For example, by issueing the following command:

telnet -l "-fbin" targethost

You will obtain a shell with the privileges of the 'bin' user.

* References:
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1
http://www.frsirt.com/english/advisories/2007/0560
http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052358.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052324.html
http://www.kb.cert.org/vuls/id/881872
http://www.milw0rm.com/exploits/3293
http://www.securitytracker.com/id?1017625
http://secunia.com/advisories/24120

* Platforms Affected:
Sun Solaris 10
Sun Solaris 11
Recommendation Install a patch (120068-02 (sparc) or 120069-02 (i386)) for this vulnerability or apply suggested workaround, as listed in Sun Alert Notification 102802 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1
Related URL CVE-2007-0882 (CVE)
Related URL 22512 (SecurityFocus)
Related URL 32434 (ISS)