Full Disclosure mailing list archives
Re: Solaris telnet vulnberability - how many on yournetwork?
From: Oscar Fajardo Sanchez <oscar.fajardo () atosorigin com>
Date: Mon, 12 Feb 2007 13:44:12 +0100
Whoa man, the return of the good old days! http://osvdb.org/displayvuln.php?osvdb_id=1007 Cheers. -----Original Message----- From: full-disclosure-bounces () lists grok org uk [mailto:full-disclosure-bounces () lists grok org uk] On Behalf Of Gadi Evron Sent: lunes, 12 de febrero de 2007 7:01 To: bugtraq () securityfocus com Cc: full-disclosure () lists grok org uk Subject: [Full-disclosure] Solaris telnet vulnberability - how many on yournetwork? Johannes Ullrich from the SANS ISC sent this to me and then I saw it on the DSHIELD list: ---- If you run Solaris, please check if you got telnet enabled NOW. If you can, block port 23 at your perimeter. There is a fairly trivial Solaris telnet 0-day. telnet -l "-froot" [hostname] will give you root on many Solaris systems with default installs We are still testing. Please use our contact form at https://isc.sans.org/contact.html if you have any details about the use of this exploit. ---- You mean they still use telnet?! Update from HD Moore: "but this bug isnt -froot, its -fanythingbutroot =P" On the exploits@ mailing list and on DSHIELD this vulnerability was verified as real. If Sun doesn't yet block port 23/tcp incoming on their /8, I'd make it a strong suggestion. Anyone else running Solaris? Gadi. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ------------------------------------------------------------------ This e-mail and the documents attached are confidential and intended solely for the addressee; it may also be privileged. If you receive this e-mail in error, please notify the sender immediately and destroy it. As its integrity cannot be secured on the Internet, the Atos Origin group liability cannot be triggered for the message content. Although the sender endeavours to maintain a computer virus-free network, the sender does not warrant that this transmission is virus-free and will not be liable for any damages resulting from any virus transmitted. Este mensaje y los ficheros adjuntos pueden contener informacion confidencial destinada solamente a la(s) persona(s) mencionadas anteriormente. Pueden estar protegidos por secreto profesional Si usted recibe este correo electronico por error, gracias de informar inmediatamente al remitente y destruir el mensaje. Al no estar asegurada la integridad de este mensaje sobre la red, Atos Origin no se hace responsable por su contenido. Su contenido no constituye ningun compromiso para el grupo Atos Origin, salvo ratificacion escrita por ambas partes. Aunque se esfuerza al maximo por mantener su red libre de virus, el emisor no puede garantizar nada al respecto y no sera responsable de cualesquiera danos que puedan resultar de una transmision de virus ------------------------------------------------------------------ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: Solaris telnet vulnberability - how many on yournetwork? Oscar Fajardo Sanchez (Feb 12)
- Re: Solaris telnet vulnberability - how many on yournetwork? Michael Holstein (Feb 12)
- Re: Solaris telnet vulnberability - how many on yournetwork? K K (Feb 12)
- Re: Solaris telnet vulnberability - how many on yournetwork? pagvac (Feb 16)
- Re: Solaris telnet vulnberability - how many on yournetwork? Marcin Antkiewicz (Feb 16)
- Re: Solaris telnet vulnberability - how many on yournetwork? pagvac (Feb 16)
- Re: Solaris telnet vulnberability - how many on yournetwork? endrazine (Feb 17)
- Re: Solaris telnet vulnberability - how many on yournetwork? pagvac (Feb 17)
- Re: Solaris telnet vulnberability - how many on yournetwork? Marcin Antkiewicz (Feb 17)
- Re: Solaris telnet vulnberability - how many on yournetwork? Michael Holstein (Feb 12)