Bug 1165787 - (CVE-2020-10188) VUL-0: CVE-2020-10188: krb5-appl,telnet-server: remote root code execution
(CVE-2020-10188)
VUL-0: CVE-2020-10188: krb5-appl,telnet-server: remote root code execution
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P2 - High : Major
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/254216/
CVSSv2:NVD:CVE-2020-10188:10.0:(AV:N...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-03-05 09:55 UTC by Marcus Meissner
Modified: 2020-10-27 15:19 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
bravestarr.py (15.01 KB, text/x-python)
2020-03-05 10:48 UTC, Marcus Meissner
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2020-03-05 09:55:50 UTC
https://appgateresearch.blogspot.com/2020/02/bravestarr-fedora-31-netkit-telnetd_28.html

very long writeup not included here
Comment 1 Marcus Meissner 2020-03-05 10:48:09 UTC
Created attachment 831996 [details]
bravestarr.py

QA REPRODUCER:

install telnet-server and enable it to run (systemctl start telnet.socket)

python3 bravestarr.py  -H localhost leak
Comment 2 Marcus Meissner 2020-03-05 10:52:15 UTC
we do not seem to be shipping netkit telnet, but instead (free)bsd telnet.
Comment 3 Marcus Meissner 2020-03-06 07:31:21 UTC
cve requested via webform
Comment 4 Marcus Meissner 2020-03-06 14:51:01 UTC
we need to check krb5-appl
Comment 5 Marcus Meissner 2020-03-10 14:12:20 UTC
The telnetd in krb5-appl looks like it uses the old code that is affected.

reassign to samuel
Comment 7 Swamp Workflow Management 2020-06-04 13:16:12 UTC
SUSE-SU-2020:1533-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1165787
CVE References: CVE-2020-10188
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    krb5-appl-1.0.3-3.3.1
SUSE OpenStack Cloud 8 (src):    krb5-appl-1.0.3-3.3.1
SUSE OpenStack Cloud 7 (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server 12-SP5 (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server 12-SP4 (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    krb5-appl-1.0.3-3.3.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    krb5-appl-1.0.3-3.3.1
SUSE Enterprise Storage 5 (src):    krb5-appl-1.0.3-3.3.1
HPE Helion Openstack 8 (src):    krb5-appl-1.0.3-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Samuel Cabrero 2020-08-24 13:13:01 UTC
Assigned to security team to close it.
Comment 9 Alexandros Toptsoglou 2020-10-27 15:19:27 UTC
DONE