Bugtraq mailing list archives
Re: Solaris sadmind Buffer Overflow Vulnerability
From: anthonyu () KILLA NET (Anthony D. Urso)
Date: Sun, 12 Dec 1999 11:52:37 -0800
On Fri, Dec 10, 1999 at 01:12:10PM -0800, Brad Powell wrote:
You missed a couple other things that will help. Tcp_wrappers on the service,
Since sadmind communicates via udp, tcp_wrappers' tcpd will provide no help. I recommend xinetd (http://www.synack.net/xinetd/) which will "wrap" all services designed to run out of inetd, including rpc/udp services. It is able to link with libwrap and use hosts.allow/hosts.deny, or even better, it has its own acl format for limiting connections to those from more trusted hosts. -- Au PGP Key ID: 0x385B44CB Fingerprint: 9E9E B116 DB2C D734 C090 E72F 43A0 95C4 385B 44CB lottery(n): A tax on people who are bad at math.
Current thread:
- Re: Solaris sadmind Buffer Overflow Vulnerability Brad Powell (Dec 10)
- Re: Solaris sadmind Buffer Overflow Vulnerability Anthony D. Urso (Dec 12)