Home page logo

bugtraq logo Bugtraq mailing list archives

Re: Solaris sadmind Buffer Overflow Vulnerability
From: anthonyu () KILLA NET (Anthony D. Urso)
Date: Sun, 12 Dec 1999 11:52:37 -0800

On Fri, Dec 10, 1999 at 01:12:10PM -0800, Brad Powell wrote:
You missed a couple other things that will help. Tcp_wrappers on
the service,

Since sadmind communicates via udp, tcp_wrappers' tcpd will provide
no help.  I recommend xinetd (http://www.synack.net/xinetd/) which will
"wrap" all services designed to run out of inetd, including rpc/udp

It is able to link with libwrap and use hosts.allow/hosts.deny, or
even better, it has its own acl format for limiting connections to those
from more trusted hosts.


PGP Key ID: 0x385B44CB
Fingerprint: 9E9E B116 DB2C D734 C090  E72F 43A0 95C4 385B 44CB
       lottery(n): A tax on people who are bad at math.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]