Incidents
Re: Anybody recognize this Solaris compromise? Apr 18 2007 04:08PM
Jamie Riden (jamie riden gmail com)
On 18/04/07, jwmeritt (at) aol (dot) com [email concealed] <jwmeritt (at) aol (dot) com [email concealed]> wrote:
>
> 'a' telnetd vulnerability., not 'the' vulnerability.
>
> James W. Meritt
> CISSP, CISA, NSA IAM, PMP

Matt said "if you were compromised by the telnetd vulnerability Jamie
linked to".
I linked to a specific vulnerability (incorrect sanitisation of the
USER environment variable apparently), hence 'the' is appropriate.

There have of course been other telnetd vulnerabilities in the past,
going back at least as far as 1991. ( e.g.
http://www.cert.org/advisories/CA-1991-02.html ,
http://www.cert.org/advisories/CA-2001-21.html )

cheers,
Jamie
--
Jamie Riden, CISSP / jamesr (at) europe (dot) com [email concealed] / jamie (at) honeynet.org (dot) uk [email concealed]
UK Honeynet Project: http://www.ukhoneynet.org/

------------------------------------------------------------------------
-
This list sponsored by: SPI Dynamics

ALERT: "How a Hacker Launches a SQL Injection Attack!"-
SPI Dynamics White Paper
It's as simple as placing additional SQL commands into a Web Form input
box giving hackers complete access to all your backend systems!
Firewalls and IDS will not stop such attacks because SQL Injections are
NOT seen as intruders. Download this *FREE* white paper from SPI Dynamics
for a complete guide to protection!

https://download.spidynamics.com/1/ad/sql.asp?Campaign_ID=70160000000CiN
E
------------------------------------------------------------------------
--

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus