Re: Remote root telnet exploit on Solaris 10 and 11

From: W.D.McKinney <deem@wdm.com>
Date: Mon Feb 12 2007 - 14:18:01 AKST

_____
From: adamb@glaven.org
To: aklug@aklug.org
Sent: Mon, 12 Feb 2007 13:12:50 -0900
Subject: Re: Remote root telnet exploit on Solaris 10 and 11

Hey, rooms don't heat themselves, Damien.
  
  Adam
  One rack I have now has 14 devices. Switches, routers, UPS, and servers, etc.
Put's out plenty of heat :-)

You've seen it.

-Dee

> I have two questions for you.
>
> 1. Why would you run Solaris?
> 2. Why would you run telnet?
>
>
>
> Tom Simes wrote:
>> http://isc.sans.org/diary.html?storyid=2220
>>
>> From the article (Published: 2007-02-12):
>> There is a major zero day bug announced in solaris 10 and 11 with the
>> telnet and login combination. It has been verified.
>> ...
>> The issue:
>> The telnet daemon passes switches directly to the login process which
>> looks for a switch that allows root to login to any account without a
>> password. If your telnet daemon is running as root it allows
>> unauthenticated remote logins
>> ...
>> Versions of Solaris 9 and lower do not appear to have this
>> vulnerability.
>> ...
>> The FIX:
>> To disable telnet in solaris 10 or 11 this command should work.
>> svcadm disable telnet
>>
>> Tom
>>
>
  
    
---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Mon Feb 12 14:10:57 2007

This archive was generated by hypermail 2.1.8 : Mon Feb 12 2007 - 14:10:57 AKST