[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201103311518.p2VFId9k026521@dm-holland-01.uk.sun.com>
Date: Thu, 31 Mar 2011 17:18:38 +0200
From: Casper.Dik@...cle.COM
To: "Chris O'Regan" <chris@...s.concordia.ca>
Cc: Jim Harrison <Jim@...tools.org>,
"bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: Re: Solaris 10 Port Stealing Vulnerability
>Imagine if you find a Solaris system running a web server that has a
>remote exploit which allows for the execution of arbitrary code. If the
>web server happens to be listening on the wildcard interface than you
>can very easily insert your own web server in front of it!
There SO_EXCLBIND setsockopt in Solaris which protects hijacking the port.
Casper
Powered by blists - more mailing lists