[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-Disclosure] iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting



In some mail from titus@xxxxxxxx, sie said:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> It's news worthy.  This vulnerability has been privately exploited for
> at least 7 years.  Most Solaris machines that have sadmin open are
> exploitable.
> It's a shame to see an excellent vulnerability such as this finally
> be made public.

What's news here?  I mean setting "-S 2" for sadmind (if sadmind is
required) has been on the "tighten up" list (for me at least) for just
as long.

Darren

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html