RE: Solaris telnet vulnberability - how many on your network?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 13 Feb 2007, Oliver Friedrichs wrote:
> 
> Gadi,
> 
> It looks like I was confused, this actually affected AIX and Linux in
> 1994:
> 
> http://www.securityfocus.com/bid/458/info
> http://www.cert.org/advisories/CA-1994-09.html

Same same but with rlogin, as someone mentioned on DSHIELD.

	Gadi.

> 
> Oliver
> 
> -----Original Message-----
> From: Gadi Evron [mailto:ge@xxxxxxxxxxxx] 
> Sent: Tuesday, February 13, 2007 1:46 AM
> To: Oliver Friedrichs
> Cc: bugtraq@xxxxxxxxxxxxxxxxx; full-disclosure@xxxxxxxxxxxxxxxxx
> Subject: RE: Solaris telnet vulnberability - how many on your network?
> 
> On Mon, 12 Feb 2007, Oliver Friedrichs wrote:
> > 
> > Am I missing something?  This vulnerability is close to 10 years old.
> > It was in one of the first versions of Solaris after Sun moved off of 
> > the SunOS BSD platform and over to SysV.  It has specifically to do 
> > with how arguments are processed via getopt() if I recall correctly.
> 
> Hey Oliver! :)
> 
> Well than, I guess it just became new again. And to be honest, I have to
> agree with a previous poster and suspect (only suspect) it could somehow
> be a backdoor rather than a bug.
> 
> The reason why this vulnerability is so critical is the number of
> networks and organizations which rely on Solaris for critical production
> servers, as well as use telnet for internal communication on their LAN
> (now how smart is that? I'd rather use telnet on the Internet than on a
> local LAN).
> 
> Further, there are quite a few third party appliances (some
> infrastructure back-end) that can not easily be patched running on
> Solaris (forget fuzzing or VA, people never even NMAP appliances they
> buy).
> 
> I am unsure of how long we will see this in to-do items of corporate
> security teams around the world, but I am sure Sun's /8 is getting a lot
> of action recently.
> 
> > 
> > Oliver
> 
> 	Gadi.
> 
> > 
> > -----Original Message-----
> > From: Gadi Evron [mailto:ge@xxxxxxxxxxxx]
> > Sent: Sunday, February 11, 2007 10:01 PM
> > To: bugtraq@xxxxxxxxxxxxxxxxx
> > Cc: full-disclosure@xxxxxxxxxxxxxxxxx
> > Subject: Solaris telnet vulnberability - how many on your network?
> > 
> > Johannes Ullrich from the SANS ISC sent this to me and then I saw it 
> > on the DSHIELD list:
> > 
> > ----
> >     If you run Solaris, please check if you got telnet enabled NOW. If
> 
> > you
> >     can, block port 23 at your perimeter. There is a fairly trivial
> >     Solaris telnet 0-day.
> > 
> >     telnet -l "-froot" [hostname]
> > 
> >     will give you root on many Solaris systems with default installs
> >     We are still testing. Please use our contact form at
> >     https://isc.sans.org/contact.html
> >     if you have any details about the use of this exploit.
> > ----
> > 
> > You mean they still use telnet?!
> > 
> > Update from HD Moore:
> > "but this bug isnt -froot, its -fanythingbutroot =P"
> > 
> > On the exploits@ mailing list and on DSHIELD this vulnerability was 
> > verified as real.
> > 
> > If Sun doesn't yet block port 23/tcp incoming on their /8, I'd make it
> 
> > a strong suggestion.
> > 
> > Anyone else running Solaris?
> > 
> > 	Gadi.
> > 
> > 
> 
> 


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux