Skip to main content

GNU InetUtils的telnetd存在重大漏洞,未通過身分驗證的攻擊者可執行任意程式碼

Posted in 業界新聞
新聞

資安公司Dream Security發布漏洞公告指出,他們發現telnetd服務存在另一個重大漏洞CVE-2026-32746,攻擊者無需登入或通過身分驗證,即可透過特製封包觸發遠端程式碼執行(RCE),並取得系統最高權限,CVSS評分高達9.8,屬於重大層級。該公司表示,問題出在telnetd處理LINEMODE SLC(Set Local Characters)協商機制時,未正確檢查緩衝區大小,導致典型的記憶體緩衝區溢位。

攻擊者只需透過Telnet連線,在連線初始交握的階段傳送特製SLC資料,即可觸發漏洞。此漏洞的根源在於程式在處理SLC參數時,會持續將資料寫入固定大小的緩衝區,但未檢查是否已達上限。攻擊者可透過大量惡意資料覆寫記憶體,進而實現任意寫入,最終達成遠端程式碼執行。

此漏洞影響2.7版以前的GNU Inetutils。Dream Security強調,由於漏洞利用門檻極低,且系統會因此完全被入侵,加上目前尚未有修補程式,該公司呼籲,企業應立即停用Telnet服務或限制對外存取,並關注後續修補更新。

Preview image for Vulnerability advisory: Pre-Auth Remote Code Execution via Buffer Overflow in telnetd LINEMODE SLC Handler​ - Dream Security

Vulnerability advisory: Pre-Auth Remote Code Execution via Buffer Overflow in telnetd LINEMODE SLC Handler​ - Dream Security

Vulnerability advisory: Pre-Auth Remote Code Execution via Buffer Overflow in telnetd LINEMODE SLC Handler This advisory is published in the public interest to enable defenders to assess exposure and apply mitigations. Responsible disclosure practices apply. Advisory ID: VULN-TELNETD-SLC-2025 Date: 2026-03-13 CVE ID: CVE-2026-32746 Severity: Critical CVSS 3.1 Score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CWE Classification: CWE-120 (Buffer Copy without Checking […]

dreamgroup.com
View original 0 Likes 0 Boosts

Comments (0)

No comments yet.