[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-id: <76BD4E6231F77947B6885C75E5214FA5767884@INTMAIL01.es.int.atosorigin.com>
Date: Mon, 12 Feb 2007 13:44:12 +0100
From: Oscar Fajardo Sanchez <oscar.fajardo@...sorigin.com>
To: Gadi Evron <ge@...uxbox.org>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Solaris telnet vulnberability - how many on
yournetwork?
Whoa man, the return of the good old days!
http://osvdb.org/displayvuln.php?osvdb_id=1007
Cheers.
-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of Gadi
Evron
Sent: lunes, 12 de febrero de 2007 7:01
To: bugtraq@...urityfocus.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: [Full-disclosure] Solaris telnet vulnberability - how many on
yournetwork?
Johannes Ullrich from the SANS ISC sent this to me and then I saw it on
the DSHIELD list:
----
If you run Solaris, please check if you got telnet enabled NOW. If
you
can, block port 23 at your perimeter. There is a fairly trivial
Solaris telnet 0-day.
telnet -l "-froot" [hostname]
will give you root on many Solaris systems with default installs
We are still testing. Please use our contact form at
https://isc.sans.org/contact.html
if you have any details about the use of this exploit.
----
You mean they still use telnet?!
Update from HD Moore:
"but this bug isnt -froot, its -fanythingbutroot =P"
On the exploits@ mailing list and on DSHIELD this vulnerability was
verified as real.
If Sun doesn't yet block port 23/tcp incoming on their /8, I'd make it a
strong suggestion.
Anyone else running Solaris?
Gadi.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
------------------------------------------------------------------
This e-mail and the documents attached are confidential and intended solely
for the addressee; it may also be privileged. If you receive this e-mail
in error, please notify the sender immediately and destroy it.
As its integrity cannot be secured on the Internet, the Atos Origin group
liability cannot be triggered for the message content. Although the
sender endeavours to maintain a computer virus-free network, the sender does
not warrant that this transmission is virus-free and will not be liable for
any damages resulting from any virus transmitted.
Este mensaje y los ficheros adjuntos pueden contener informacion
confidencial destinada solamente a la(s) persona(s) mencionadas
anteriormente. Pueden estar protegidos por secreto profesional Si usted
recibe este correo electronico por error, gracias de informar inmediatamente
al remitente y destruir el mensaje.
Al no estar asegurada la integridad de este mensaje sobre la red, Atos
Origin no se hace responsable por su contenido. Su contenido no constituye
ningun compromiso para el grupo Atos Origin, salvo ratificacion escrita por
ambas partes.
Aunque se esfuerza al maximo por mantener su red libre de virus, el emisor
no puede garantizar nada al respecto y no sera responsable de cualesquiera
danos que puedan resultar de una transmision de virus
------------------------------------------------------------------
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists