SUMMARY: telnetd buffer overflow vulnerability?

From: Alam, Sim <sim.alam_at_education.tas.gov.au>
Date: Fri, 27 Jul 2001 12:21:10 +1000

Rest easy. I hope ;)

>From Phillip Brown at Compaq. Thanks Compaq for the quick response to
this.

"Compaq case id SSRT0745U

ref: potential telnetd option handling vulnerability

x-ref: TESO Security Advisory 06/2001
       CERT CA2001-21 Advisory 07/2001


 Compaq has evaluated this vulnerability to telnetd
 distributed for Compaq Tru64/UNIX and OpenVMS Operating
 Systems Software and has determined that telnetd is not
 vulnerable to unauthorized command execution or
 root compromise.

 Compaq appreciates your cooperation and patience.
 We regret any inconvenience applying this information
 may cause.

 As always, Compaq urges you to periodically review your system
 management and security procedures. Compaq will continue to
 review and enhance the security features of its products and work
 with customers to maintain and improve the security and integrity
 of their systems.

 To subscribe to automatically receive future NEW Security
 Advisories from the Compaq's Software Security Response Team
 via electronic mail,

 Use your browser select the URL
  http://www.support.compaq.com/patches/mailing-list.shtml
  Select "Security and Individual Notices" for immediate dispatch
  notifications directly to your mailbox.

  To report new Security Vulnerabilities, send mail to:
     security-ssrt_at_compaq.com

(c) Copyright 2001 Compaq Computer Corporation. All rights reserved. "
Received on Fri Jul 27 2001 - 02:22:19 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:42 NZDT