Monday, 13 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Telnet vulnerability opens door to remote code execution as root
Global Market

Telnet vulnerability opens door to remote code execution as root

Last updated: March 19, 2026 5:02 pm
Published March 19, 2026
Share
A photograph of a row of Ethernet cables plugged into ports, with a warning sign illuminated above one of the ports.
SHARE

“The SLC response is inbuilt a set 108-byte buffer, slcbuf, with solely 104 bytes used for knowledge after a 4-byte header. The perform add_slc() (strains 162-175) appends 3 bytes per SLC triplet however by no means checks whether or not the buffer is full. The pointer slcptr is simply incremented every time,” the corporate instructed the maintainers, in keeping with a message to a GNU mailing list.

“After about 35 triplets […], the 104-byte area is exceeded and the code writes previous the tip of slcbuf. That corrupts no matter lies after it in BSS (together with the slcptr pointer). Later, end_slc() makes use of the corrupted slcptr to write down the suboption finish marker, which provides the attacker an arbitrary write in reminiscence. So the bug is a basic buffer overflow with no bounds examine,” the message continued.

The maintainers ready a patch the subsequent day, planning to launch it by April 1, in keeping with a timeline in Dream’s advisory.

Susceptible programs embrace embedded programs and IoT units with an uncovered Telnet interface; servers and home equipment that pay attention on TCP port 23 and use the susceptible codebase, and Linux distributions that ship inetutils and go away telnetd enabled or installable, together with Debian, Ubutnu, RHEL and SUSE, Dream mentioned.

“A single community connection to port 23 is enough to set off the vulnerability. No credentials, no person interplay, and no particular community place are required,” it mentioned.

Dream suggested numerous rapid workarounds till the software program may be patched, together with migrating to safe alternate options reminiscent of SSH and disabling telnetd or operating it with out root privileges. The place that’s not doable, it suggested blocking port 23 on the community perimeter and proscribing its use to trusted hosts.

See also  Cybersecurity Company Rubrik to Go Public, Targets NYSE Debut

Source link

TAGGED: Code, door, Execution, opens, Remote, root, Telnet, vulnerability
Share This Article
Twitter Email Copy Link Print
Previous Article Visa prepares payment systems for AI agent-initiated transactions Visa prepares payment systems for AI agent-initiated transactions
Next Article NVIDIA Agent Toolkit Gives Enterprises a Framework to Deploy AI Agents at Scale NVIDIA Agent Toolkit Gives Enterprises a Framework to Deploy AI Agents at Scale
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Empowering critical infrastructure through talent

Vertiv has opened its new Vertiv Academy coaching centre in Frankfurt, Germany. Strategically situated in…

June 30, 2025

Native Stablecoins Swell on Sui as Agora Adds AUSD Stablecoin to Network

Austin, Texas, twenty ninth Could 2024, Chainwire Austin, Texas, Could twenty ninth, 2024, Chainwire Agora…

May 29, 2024

Iberdrola taps Barbara for edge computing overhaul in smart grid substations

Barbara, the commercial edge platform supplier is partnering with Iberdrola to develop edge computing firmware…

October 23, 2024

Cisco and NTT DATA Partner to Modernize Networks for AI Era

NTT DATA and Cisco have introduced a deepened collaboration aimed toward reshaping enterprise networking for…

August 29, 2025

When Will SMRs Finally Take Off?

Amid rising energy constraints and issues over long-term power sustainability within the information middle trade…

January 22, 2025

You Might Also Like

Nvidia GTC 2026 Vera Rubin
Global Market

Nvidia Rubin GPUs may be delayed, slowing the next phase of AI infrastructure

By saad
Yael Nardi Names Minimus as Chief Business Officer to Head Growth Strategy
Global Market

Yael Nardi joins Minimus as Chief Business Officer to head growth strategy

By saad
Cloud Security Concept: Businessman uses tablet on Secure Global Networking, Data Encryption, Firewall Protection, Continuous Monitoring, to Develop Smart Solutions from Digital Technology.
Global Market

Upstream network visibility is enterprise security’s new front line

By saad
AI Agents
Global Market

Cisco to acquire Galileo for AI observability

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.