11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)
好的,我现在需要帮用户总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是一个严重的漏洞CVE-2026-24061,影响GNU InetUtils的telnetd,CVSS评分9.8。这个漏洞存在了近11年,从2015年引入代码到2026年被发现。攻击者可以利用这个漏洞通过构造特定的USER环境变量来绕过认证,直接获取root权限。 接下来,我需要把这些信息浓缩成简短的句子。要包括漏洞名称、影响范围、CVSS评分、存在时间、攻击方式以及危害。同时要保持语言简洁明了。 可能的结构是:先点出漏洞及其影响范围和评分,然后说明存在时间,接着描述攻击方式和后果。最后提到补丁和缓解措施。 现在开始组织语言: “GNU InetUtils telnetd 存在严重漏洞 CVE-2026-24061(CVSS 9.8),影响 1.9.3 至 2.7 版本。该漏洞已存在 11 年,允许攻击者通过构造 USER 环境变量绕过认证获取 root 权限。” 这样控制在了两句话内,大约50字左右,符合用户的要求。 </think> GNU InetUtils telnetd 存在严重漏洞 CVE-2026-24061(CVSS 9.8),影响 1.9.3 至 2.7 版本。该漏洞已存在 11 年,允许攻击者通过构造 USER 环境变量绕过认证获取 root 权限。 2026-1-24 00:27:25 Author: securityaffairs.com(查看原文) 阅读量:2 收藏

11-Year-Old critical telnetd flaw found in GNU InetUtils (CVE-2026-24061)

Critical telnetd flaw CVE-2026-24061 (CVSS 9.8) affects all GNU InetUtils versions 1.9.3–2.7 and went unnoticed for nearly 11 years.

A critical vulnerability, tracked as CVE-2026-24061 (CVSS score of 9.8), in the GNU InetUtils telnet daemon (telnetd) impacts all versions from 1.9.3 to 2.7. The vulnerability can be exploited to gain root access on affected systems.

Telnetd is a server implementing the DARPA Telnet protocol, typically launched by inetd to handle connections on the Telnet port, with options to run manually in debug mode or on alternate TCP ports.

The vulnerability was introduced as part of a source code commit made on March 19, 2015. The flaw remained undiscovered for nearly 11 years, posing long-standing security risks.

“The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter. If the client supply a carefully crafted USER environment value being the string “-f root”, and passes the telnet(1) -a or –login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.” reads the advisory. “This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.”

Security researcher Kyu Neushwaistein (aka Carlos Cortes Alvarez) reported the flaw on January 19, 2026.

To mitigate the flaw, apply the latest patches and restrict access to the telnet service to trusted clients. Disable the telnetd server if possible, or configure it to use a custom login tool that prevents use of the “-f” option.

Cybersecurity firm GreyNoise already observed exploitation attempts for this flaw.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, GNU InetUtils)




文章来源: https://securityaffairs.com/187255/security/11-year-old-critical-telnetd-flaw-found-in-gnu-inetutils-cve-2026-24061.html
如有侵权请联系:admin#unsafe.sh