Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2005:327 - Security Advisory
Issued:
2005-03-28
Updated:
2005-03-28

RHSA-2005:327 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

telnet security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated telnet packages that fix two buffer overflow vulnerabilities are
now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

The telnet package provides a command line telnet client. The telnet-server
package includes a telnet daemon, telnetd, that supports remote login to
the host machine.

Two buffer overflow flaws were discovered in the way the telnet client
handles messages from a server. An attacker may be able to execute
arbitrary code on a victim's machine if the victim can be tricked into
connecting to a malicious telnet server. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the names CAN-2005-0468
and CAN-2005-0469 to these issues.

Additionally, the following bugs have been fixed in these erratum packages
for Red Hat Enterprise Linux 2.1 and Red Hat Enterprise Linux 3:

  • telnetd could loop on an error in the child side process
  • There was a race condition in telnetd on a wtmp lock on some occasions
  • The command line in the process table was sometimes too long and caused

bad output from the ps command

  • The 8-bit binary option was not working

Users of telnet should upgrade to this updated package, which contains
backported patches to correct these issues.

Red Hat would like to thank iDEFENSE for their responsible disclosure of
this issue.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux Server 2 ia64
  • Red Hat Enterprise Linux Server 2 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Workstation 2 ia64
  • Red Hat Enterprise Linux Workstation 2 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc

Fixes

  • BZ - 126858 - Too long /proc/X/cmdline: bad ps output when piped to less/more
  • BZ - 145004 - telnetd cleanup() race condition with syslog in signal handler
  • BZ - 145636 - [PATCH] telnetd loops on child IO error
  • BZ - 147003 - [RHEL3] telnetd cleanup() race condition with syslog in signal handler
  • BZ - 151297 - CAN-2005-0469 slc_add_reply() Buffer Overflow Vulnerability
  • BZ - 151301 - CAN-2005-0468 env_opt_add() Buffer Overflow Vulnerability

CVEs

  • CVE-2005-0469
  • CVE-2005-0468

References

  • http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities
  • http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
x86_64
telnet-0.17-31.EL4.2.x86_64.rpm SHA-256: b3b94a470294d70d14260b79a296c03150fa032be8479e541b99f2f63c4082de
telnet-0.17-31.EL4.2.x86_64.rpm SHA-256: b3b94a470294d70d14260b79a296c03150fa032be8479e541b99f2f63c4082de
telnet-server-0.17-31.EL4.2.x86_64.rpm SHA-256: d2531cf16d75de14fda0bf3125ba75adcf4a08e15be6490eba905ee15913b7d7
telnet-server-0.17-31.EL4.2.x86_64.rpm SHA-256: d2531cf16d75de14fda0bf3125ba75adcf4a08e15be6490eba905ee15913b7d7
ia64
telnet-0.17-31.EL4.2.ia64.rpm SHA-256: 1c829241601d1ed3ab5a27e61ce160e4b8aed0001a9504697e92a3f9ec3a23fe
telnet-0.17-31.EL4.2.ia64.rpm SHA-256: 1c829241601d1ed3ab5a27e61ce160e4b8aed0001a9504697e92a3f9ec3a23fe
telnet-server-0.17-31.EL4.2.ia64.rpm SHA-256: 4fcda946ffa972893c4e58a11942a7c77233ad1d787e23027a335faf5ea8a853
telnet-server-0.17-31.EL4.2.ia64.rpm SHA-256: 4fcda946ffa972893c4e58a11942a7c77233ad1d787e23027a335faf5ea8a853
i386
telnet-0.17-31.EL4.2.i386.rpm SHA-256: c7a5d85ae324ff67af84b395f41a75cd065fd78b450772497f1a9a7035fc7d5d
telnet-0.17-31.EL4.2.i386.rpm SHA-256: c7a5d85ae324ff67af84b395f41a75cd065fd78b450772497f1a9a7035fc7d5d
telnet-server-0.17-31.EL4.2.i386.rpm SHA-256: 12844e687dd636665808428e2a7d196a41133980871892b2c6bc5018b1829e42
telnet-server-0.17-31.EL4.2.i386.rpm SHA-256: 12844e687dd636665808428e2a7d196a41133980871892b2c6bc5018b1829e42

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server 2

SRPM
ia64
i386

Red Hat Enterprise Linux Workstation 4

SRPM
x86_64
telnet-0.17-31.EL4.2.x86_64.rpm SHA-256: b3b94a470294d70d14260b79a296c03150fa032be8479e541b99f2f63c4082de
telnet-server-0.17-31.EL4.2.x86_64.rpm SHA-256: d2531cf16d75de14fda0bf3125ba75adcf4a08e15be6490eba905ee15913b7d7
ia64
telnet-0.17-31.EL4.2.ia64.rpm SHA-256: 1c829241601d1ed3ab5a27e61ce160e4b8aed0001a9504697e92a3f9ec3a23fe
telnet-server-0.17-31.EL4.2.ia64.rpm SHA-256: 4fcda946ffa972893c4e58a11942a7c77233ad1d787e23027a335faf5ea8a853
i386
telnet-0.17-31.EL4.2.i386.rpm SHA-256: c7a5d85ae324ff67af84b395f41a75cd065fd78b450772497f1a9a7035fc7d5d
telnet-server-0.17-31.EL4.2.i386.rpm SHA-256: 12844e687dd636665808428e2a7d196a41133980871892b2c6bc5018b1829e42

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 2

SRPM
ia64
i386

Red Hat Enterprise Linux Desktop 4

SRPM
x86_64
telnet-0.17-31.EL4.2.x86_64.rpm SHA-256: b3b94a470294d70d14260b79a296c03150fa032be8479e541b99f2f63c4082de
telnet-server-0.17-31.EL4.2.x86_64.rpm SHA-256: d2531cf16d75de14fda0bf3125ba75adcf4a08e15be6490eba905ee15913b7d7
i386
telnet-0.17-31.EL4.2.i386.rpm SHA-256: c7a5d85ae324ff67af84b395f41a75cd065fd78b450772497f1a9a7035fc7d5d
telnet-server-0.17-31.EL4.2.i386.rpm SHA-256: 12844e687dd636665808428e2a7d196a41133980871892b2c6bc5018b1829e42

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
s390x
telnet-0.17-31.EL4.2.s390x.rpm SHA-256: 2be03170685d5c3fc2bfc371f37cc7d97f201225f73ad5334de6220cf3ebccf7
telnet-server-0.17-31.EL4.2.s390x.rpm SHA-256: b472b1239571094752098448e34595b14d553d7d59fe38e7ef443ac072dcefcb
s390
telnet-0.17-31.EL4.2.s390.rpm SHA-256: cdbd89387551f0a57ee28ed34c18cd494592f564a3aacd878c4ff51d04c181b9
telnet-server-0.17-31.EL4.2.s390.rpm SHA-256: 03f846c2b37b76c640d3a66827f7d5c9438577791d0ce6f1c4d3df23433d1324

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ppc
telnet-0.17-31.EL4.2.ppc.rpm SHA-256: 4ab1191a8da25679dde22a47d3aedab0f1cea1ec09a66bbbcf01c281a6fd3f9f
telnet-server-0.17-31.EL4.2.ppc.rpm SHA-256: 3a3f652e290fa633f2258fa10ac3587f7a78be85bd0ee1f74891248400b5768a

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility