IBM Information for VU#745371

Multiple vendor telnet daemons vulnerable to buffer overflow via crafted protocol options



Vendor Statement

IBM's AIX operating system, versions 5.1L and under, is vulnerable to this exploit.

An emergency fix (efix) is now available for downloading from the ftp site The efix package name to fix this vulnerability is "telnetd_efix.tar.Z". An advisory is included in the tarfile that gives installation instructions for the appropriate patched telnetd binary. Two patches are in the tarfile: one for AIX 4.3.3 (telnetd.433) and for AIX 5.1 (telnetd.510).

IBM has these APAR assignments for this vulnerability: For AIX 4.3.3, the APAR number is IY22029. For AIX 5.1, the APAR number is IY22021.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.