mailing list archives
Re: sadmind exploits (remote sparc/x86)
From: techs () OBFUSCATION ORG (Erik Fichtner)
Date: Fri, 10 Dec 1999 18:41:27 -0500
If you want to be a little less appetizing to the bear than the other guy
until Sun coughs up a sadmind patch (if you're one of the unlucky sites
that has a need for it), get thee hence to
and replace the rpcbind on your solaris2 system with Weitse's tcpwrapped
It will NOT stop the buffer overflow in sadmind by any means,
but it will stop this particular exploit script from being used by those
who cannot fix the code to not ask portmapper for the sadmind port.
(of course, since it's 18:45 EST on a friday, I imagine someone will post
a version that does direct-to-sadmind-port poking well before monday a.m.)
Erik Fichtner; Warrior SysAdmin (emf|techs) 34.9908%
http://www.obfuscation.org/~techs N 38 53.055' W 77 21.860' 764 ft.
"What's the most effective Windows NT remote management tool?"
"A car." -- Stephen Northcutt