<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Telnet Daemon TERMCAP check in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565905#M759274</link>
    <description>Telnet by nature sends plain text through the network, which is sniffable, there are numerous other problems with telnet besides this. Try installing SSH or OpenSSH. It will provide you the same functionality with an encrypted data stream.&lt;BR /&gt;&lt;A href="http://www.ssh.com" target="_blank"&gt;http://www.ssh.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.openssh.com" target="_blank"&gt;http://www.openssh.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps&lt;BR /&gt;&lt;BR /&gt;Brian</description>
    <pubDate>Thu, 13 Sep 2001 15:42:56 GMT</pubDate>
    <dc:creator>Brian Markus</dc:creator>
    <dc:date>2001-09-13T15:42:56Z</dc:date>
    <item>
      <title>Telnet Daemon TERMCAP check</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565901#M759270</link>
      <description>I am using HP-UX 11.0 &lt;BR /&gt;for security auditing with cybercop , following is high risk result:&lt;BR /&gt;&lt;BR /&gt;Description: This module determines whether the remote telnet daemon is vulnerable&lt;BR /&gt; to a buffer overflow attack in the tgetent library routine when parsing &lt;BR /&gt; a terminal capability file.  By uploading an alternate TERMCAP file, &lt;BR /&gt; an attacker can specify the path to this file and cause the telnet &lt;BR /&gt; daemon to execute arbitrary commands.&lt;BR /&gt; Security Concerns: Remote attackers can obtain superuser access remotely by connecting&lt;BR /&gt; to the telnet daemon.&lt;BR /&gt; Suggestion: Affected vendors have released patches for this problem.  If your&lt;BR /&gt; system is found to be vulnerable to this attack, contact your operating&lt;BR /&gt; system vendor for a patch or upgrade to a more recent release.&lt;BR /&gt; Additionally, upgrading to a version of libtermcap more recent than &lt;BR /&gt; 2.0.8 or to a telnet daemon that relies on ncurses will eliminate this &lt;BR /&gt; vulnerability.&lt;BR /&gt;------------------&lt;BR /&gt;&lt;BR /&gt;by the way I already install the latested telnet patch and cannot find any patch to resolved this risk.&lt;BR /&gt;&lt;BR /&gt;please advise,&lt;BR /&gt;thanks</description>
      <pubDate>Thu, 16 Aug 2001 06:48:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565901#M759270</guid>
      <dc:creator>Printaporn_1</dc:creator>
      <dc:date>2001-08-16T06:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: Telnet Daemon TERMCAP check</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565902#M759271</link>
      <description>&lt;BR /&gt;This is not a risk on HPux 11.xx</description>
      <pubDate>Thu, 16 Aug 2001 11:52:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565902#M759271</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2001-08-16T11:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: Telnet Daemon TERMCAP check</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565903#M759272</link>
      <description>Secure your telnet daemon allowing only incoming sessions from local networt (edit /var/adm/inetd.sec file). And monitorize logins and bad logins connections using last and lastb commands. Look permissions at /var/adm/bmtp and /var/adm/wtmp files.</description>
      <pubDate>Fri, 17 Aug 2001 05:23:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565903#M759272</guid>
      <dc:creator>Manuel P. Ron</dc:creator>
      <dc:date>2001-08-17T05:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Telnet Daemon TERMCAP check</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565904#M759273</link>
      <description>telnetd is per se a security risk:&lt;BR /&gt;&lt;A href="http://www.securityportal.com/cover/coverstory20000814.html" target="_blank"&gt;http://www.securityportal.com/cover/coverstory20000814.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Disable it, and also tighten security by using tcp_wrappers.&lt;BR /&gt;</description>
      <pubDate>Fri, 17 Aug 2001 10:38:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565904#M759273</guid>
      <dc:creator>Ralf Hildebrandt</dc:creator>
      <dc:date>2001-08-17T10:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Telnet Daemon TERMCAP check</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565905#M759274</link>
      <description>Telnet by nature sends plain text through the network, which is sniffable, there are numerous other problems with telnet besides this. Try installing SSH or OpenSSH. It will provide you the same functionality with an encrypted data stream.&lt;BR /&gt;&lt;A href="http://www.ssh.com" target="_blank"&gt;http://www.ssh.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.openssh.com" target="_blank"&gt;http://www.openssh.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps&lt;BR /&gt;&lt;BR /&gt;Brian</description>
      <pubDate>Thu, 13 Sep 2001 15:42:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/telnet-daemon-termcap-check/m-p/2565905#M759274</guid>
      <dc:creator>Brian Markus</dc:creator>
      <dc:date>2001-09-13T15:42:56Z</dc:date>
    </item>
  </channel>
</rss>

