Gnu Inetutils vulnerabilities

8 known vulnerabilities affecting gnu/inetutils.

Total CVEs
8
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL3HIGH3MEDIUM1LOW1

Vulnerabilities

Page 1 of 1
CVE-2026-32772LOWCVSS 3.4≤ 2.72026-03-16
CVE-2026-32772 [LOW] CWE-669 CVE-2026-32772: telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clie telnet in GNU inetutils through 2.7 allows servers to read arbitrary environment variables from clients via NEW_ENVIRON SEND USERVAR.
cvelistv5nvd
CVE-2026-32746CRITICALCVSS 9.8≤ 2.72026-03-13
CVE-2026-32746 [CRITICAL] CWE-120 CVE-2026-32746: telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Ch telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
cvelistv5nvd
CVE-2026-28372HIGHCVSS 7.8≤ 2.72026-02-27
CVE-2026-28372 [HIGH] CWE-829 CVE-2026-28372: telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing sy telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing systemd service credentials support added to the login(1) implementation of util-linux in release 2.40. This is related to client control over the CREDENTIALS_DIRECTORY environment variable, and requires an unprivileged local user to create a login.noauth
cvelistv5nvd
CVE-2026-24061CRITICALCVSS 9.8KEVPoC≥ 1.9.3, ≤ 2.72026-01-21
CVE-2026-24061 [CRITICAL] CWE-88 CVE-2026-24061: telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for t telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.
cvelistv5nvd
CVE-2023-40303HIGHCVSS 7.8≤ 2.42023-08-14
CVE-2023-40303 [HIGH] CWE-252 CVE-2023-40303: GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
nvd
CVE-2022-39028HIGHCVSS 7.5≤ 2.32022-08-30
CVE-2022-39028 [HIGH] CWE-476 CVE-2022-39028: telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL p telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval,
nvd
CVE-2021-40491MEDIUMCVSS 6.5fixed in 2.22021-09-03
CVE-2021-40491 [MEDIUM] CVE-2021-40491: The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV respons The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.
nvd
CVE-2011-4862CRITICALCVSS 10.0ExploitedPoCfixed in 1.92011-12-25
CVE-2011-4862 [CRITICAL] CWE-120 CVE-2011-4862: Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
nvd