Re: Solaris telnet vulnberability - how many on your network?

看板Bugtraq作者時間19年前 (2007/02/22 03:47), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串11/11 (看更多)
Nate Eldredge wrote: > I have now set up a virtual Solaris 8 box to test this with root access, > and it appears you are correct. When run as root, "login -f root" > presents a login prompt, just like login without arguments. So it is > not "supported" in the sense of having the Solaris 10 documented behavior. I tested this as well on a Solaris 8 box. I did not get the behavior you described. # uname -a SunOS skyhawk 5.8 Generic_108528-29 sun4u sparc SUNW,Sun-Blade-100 # /bin/login -froot Not on system console As you can see, it did not prompt me for a password. Obviously the -f option is recognized and its semantics are implemented. However telnet could not be used to exploit it in the same was a Solaris 10 was exploited. > Using "strings" to look at the getopt option list reveals that an > undocumented "-a" option also exists. I don't know what it does, > either. More material for the backdoor conspiracy theorists, I suppose. > Fortunately there doesn't appear to be a "-nsakey" option. As far as the -a option, it does not do anything. The OpenSolaris source says: case 'a': break; I'm guessing that this behavior is left over from the older versions of Solaris. -- Edsel Adap edsel@adap.org http://www.adap.org/~edsel/ LINUX - the choice of the GNU generation
文章代碼(AID): #15tA7E00 (Bugtraq)
討論串 (同標題文章)
完整討論串 (本文為第 11 之 11 篇):
文章代碼(AID): #15tA7E00 (Bugtraq)