Bugtraq mailing list archives

Re: Solaris sadmind Buffer Overflow Vulnerability


From: anthonyu () KILLA NET (Anthony D. Urso)
Date: Sun, 12 Dec 1999 11:52:37 -0800


On Fri, Dec 10, 1999 at 01:12:10PM -0800, Brad Powell wrote:
You missed a couple other things that will help. Tcp_wrappers on
the service,

Since sadmind communicates via udp, tcp_wrappers' tcpd will provide
no help.  I recommend xinetd (http://www.synack.net/xinetd/) which will
"wrap" all services designed to run out of inetd, including rpc/udp
services.

It is able to link with libwrap and use hosts.allow/hosts.deny, or
even better, it has its own acl format for limiting connections to those
from more trusted hosts.

--
 Au

PGP Key ID: 0x385B44CB
Fingerprint: 9E9E B116 DB2C D734 C090  E72F 43A0 95C4 385B 44CB
       lottery(n): A tax on people who are bad at math.



Current thread: