Hi,

On Sun, Mar 29, 2020 at 09:40:00AM +0200, Salvatore Bonaccorso wrote:
> Hi,
> 
> On Sat, Mar 28, 2020 at 06:43:28PM +0000, Marcos Marado wrote:
> > Did anyone confirm this against Debian's netkit?
> 
> No this needs to happen yet. We rather want to play on the safe side
> here and mark something yet 'wrongly as affected until we have
> assurance that the vulnerability is not present in the code.
> > 
> > At least on 0.17.24 (the earlier version on debian I could get my
> > hands on) or later, the nextitem function has this check:
> > 
> > >        if (current >= end) {
> > >                 current = next;
> > >                if (!current) {
> > >                        return 0;
> > >                }
> > >                end = nextend;
> > >                next = 0;
> > >        }
> > 
> > From my understanding of the CVE (and brief analysis), this should be
> > enough to avoid any possible exploitation, so I installed telnetd and
> > tried to run the exploit against it. And, indeed, the result I got
> > was:
> > 
> > > ??? Connecting to 0:23
> > > infoleak unsuccessful.
> > 
> > I might be missing something here, but I suspect that debian's
> > netkit-telnet (and netkit-telnet-ssl) are not affected by this CVE.
> 
> Thanks this might help to track the issue further.

It might be possible that Debian is fixed for it since 0.17-18woody2
(for src:netkit-telnet).

Salvatore

Reply via email to