Full Disclosure mailing list archives

Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting


From: Darren Reed <avalon () caligula anu edu au>
Date: Wed, 17 Sep 2003 06:56:06 +1000 (Australia/ACT)

In some mail from titus () hush com, sie said:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It's news worthy.  This vulnerability has been privately exploited for
at least 7 years.  Most Solaris machines that have sadmin open are
exploitable.
It's a shame to see an excellent vulnerability such as this finally
be made public.

What's news here?  I mean setting "-S 2" for sadmind (if sadmind is
required) has been on the "tighten up" list (for me at least) for just
as long.

Darren

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: