Re: Solaris sadmind Buffer Overflow Vulnerability

From: Anthony D. Urso (anthonyuat_private)
Date: Sun Dec 12 1999 - 11:52:37 PST

  • Next message: Iván Arce: "Re: ssh-1.2.27 exploit"

    On Fri, Dec 10, 1999 at 01:12:10PM -0800, Brad Powell wrote:
    > You missed a couple other things that will help. Tcp_wrappers on
    > the service,
    
    Since sadmind communicates via udp, tcp_wrappers' tcpd will provide
    no help.  I recommend xinetd (http://www.synack.net/xinetd/) which will
    "wrap" all services designed to run out of inetd, including rpc/udp
    services.
    
    It is able to link with libwrap and use hosts.allow/hosts.deny, or
    even better, it has its own acl format for limiting connections to those
    from more trusted hosts.
    
    --
     Au
    
    PGP Key ID: 0x385B44CB
    Fingerprint: 9E9E B116 DB2C D734 C090  E72F 43A0 95C4 385B 44CB
           lottery(n): A tax on people who are bad at math.
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:20:42 PDT