lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070212203659.87C8311065@kris.7deadly.org>
Date: Mon, 12 Feb 2007 15:36:59 -0500
From: Graham Reed <greed@...ox.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Solaris telnet vulnberability - how many on
 your network?

Vincent Archer writes:
> We do, and we confirm. The info is spreading like wildfire, and justifiably
> so - I thought this bug category (-fuser) was squashed last with AIX over
> 10 years ago.

Everybody with the BSD tools had this bug 10-12 years ago; AIX stood out 
because there was some guy at IBM who was being... vocal about how much of a 
pain for him it was that people were exploiting the bug and making him work 
late.  Curiously, he disappeared off USENET and couldn't be found in the IBM 
directory shortly after his manager posted a public apology.... 

But this is pathetic.  It's 2007, this is a known attack vector for the 
rlogin/telnet family of commands.  And it does work on all our Solaris 10 
boxes.  At least they're behind a firewall. 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ