Full Disclosure mailing list archives
Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting
From: Darren Reed <avalon () caligula anu edu au>
Date: Wed, 17 Sep 2003 06:56:06 +1000 (Australia/ACT)
In some mail from titus () hush com, sie said:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 It's news worthy. This vulnerability has been privately exploited for at least 7 years. Most Solaris machines that have sadmin open are exploitable. It's a shame to see an excellent vulnerability such as this finally be made public.
What's news here? I mean setting "-S 2" for sadmind (if sadmind is required) has been on the "tighten up" list (for me at least) for just as long. Darren _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting iDEFENSE Labs (Sep 16)
- Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting Person (Sep 16)
- <Possible follow-ups>
- Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting titus (Sep 16)
- Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting Darren Reed (Sep 16)
- Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting Person (Sep 16)
- Re: iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting titus (Sep 16)