Recently there was a telnetd exploit that was posted to Bugtraq. The following products seem to be exposed to this vulnerability: RaQ1, RaQ2, RaQ3, CacheRaQ1, CacheRaQ2, Qube1, and Qube2. At the current moment there is not a known exploit for linux, but as we all know, this is just a matter of time. Below are some experimental RPMS that address this issue. They are being tested by our SQA group, and should be officially available by the end of the week. In the mean time, here are the RPMS that are being tested by the SQA group for those of you that are willing to give them a try. i386 (RaQ3): ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/telnet-0.16-6.i386.rpm ftp://ftp.cobaltnet.com/pub/experimental/RPMS/i386/telnet-server-0.16-6.i386.rpm md5: b145d682d1008da9c9e3a4000c5ae92f telnet-0.16-6.i386.rpm 915539a6f453149ef949dfd02c44b00b telnet-server-0.16-6.i386.rpm mips: ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/telnet-0.16-6.mips.rpm ftp://ftp.cobaltnet.com/pub/experimental/RPMS/mips/telnet-server-0.16-6.mips.rpm md5: 44c1dc83eb73505036d6ade6f1bfa588 telnet-0.16-6.mips.rpm ba00319165b3adc374aeac73d88c62bf telnet-server-0.16-6.mips.rpm If you do find any issues with these RPMS, please feel free to contact me. Jeff -- Jeff Lovell Sun Microsystems Inc. _______________________________________________ cobalt-security mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-security
