> On Thu, 12 Apr 2001, Robert G. Ferrell wrote: > > > http://rgfsparc.cr.usgs.gov:8090/sysadmin/ports.html > > thats cool. but it doesn't, for example, list various exploits in > curculation for these services, you know? like i put in 23 (for telnet) > and t didn't bring up the IRIX telnetd vulnerability. this is what i > understood the original poster to be asking about. Virtually every network service on almost every network capable platform has at one time or another contained a security flaw. These flaws have ranged from simple denial of service to full root exploits. Most of these bugs have been fixed. However more bugs will be found. If you want a list of EVERY telnet exploit for example that would be a rather huge list. This is somewhat pointless really, as you know that you need to apply all the vendor security/update patches, you know you need to apply access controls, you know you need to limit access as much as possible. Why? Because even if a network service/platform combo has had no bugs I'd be willing to bet that they exist and will be found and exploited at some point in the future. > ____________________________ > jose nazario joseat_private Kurt Seifried, seifriedat_private Securityportal - your focal point for security on the 'net
This archive was generated by hypermail 2b30 : Tue Apr 17 2001 - 19:12:07 PDT