Re: sadmind exploits (remote sparc/x86)

From: Erik Fichtner (techsat_private)
Date: Fri Dec 10 1999 - 15:41:27 PST

  • Next message: Mike Ireton: "Re: Big problem on 2.0.x?"

    If you want to be a little less appetizing to the bear than the other guy
    until Sun coughs up a sadmind patch (if you're one of the unlucky sites
    that has a need for it), get thee hence to
    
    	ftp://ftp.porcupine.org/pub/security/rpcbind_2.1.tar.gz
    
    and replace the rpcbind on your solaris2 system with Weitse's tcpwrapped
    version.
    
    	It will NOT stop the buffer overflow in sadmind by any means,
    but it will stop this particular exploit script from being used by those
    who cannot fix the code to not ask portmapper for the sadmind port.
    
    (of course, since it's 18:45 EST on a friday, I imagine someone will post
    a version that does direct-to-sadmind-port poking well before monday a.m.)
    
    --
    Erik Fichtner; Warrior SysAdmin (emf|techs)                       34.9908%
    http://www.obfuscation.org/~techs      N 38 53.055'  W 77 21.860'  764 ft.
           "What's the most effective Windows NT remote management tool?"
              "A car."  --  Stephen Northcutt
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:20:11 PDT