NULL Pointer Dereference in Telnet Service Leads to Potential Downtime for GNU Inetutils
CVE-2022-39028
Summary
The telnetd component in GNU Inetutils, up to version 2.3, and MIT krb5-appl, up to version 1.0.3, is susceptible to a NULL pointer dereference triggered by specific byte sequences. When exploited, this vulnerability may lead to repeated crashes of the telnetd application. Initially, the application will crash without affecting the telnet service, which remains operational through inetd. However, if multiple crashes occur rapidly, inetd will halt the telnet service, logging a termination error. This issue is notable as some Linux distributions still package the affected version of MIT krb5-appl, a component that has not received upstream support for years, even though the faulty code was removed from the actively supported versions of MIT Kerberos.
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved