[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting
- To: titus@xxxxxxxx
- Subject: Re: [Full-Disclosure] iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting
- From: Darren Reed <avalon@xxxxxxxxxxxxxxxxxxx>
- Date: Wed, 17 Sep 2003 06:56:06 +1000 (Australia/ACT)
In some mail from titus@xxxxxxxx, sie said:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> It's news worthy. This vulnerability has been privately exploited for
> at least 7 years. Most Solaris machines that have sadmin open are
> exploitable.
> It's a shame to see an excellent vulnerability such as this finally
> be made public.
What's news here? I mean setting "-S 2" for sadmind (if sadmind is
required) has been on the "tighten up" list (for me at least) for just
as long.
Darren
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html