Linked by Thom Holwerda on Mon 12th Feb 2007 18:30 UTC, submitted by stare
Sun Solaris, OpenSolaris If you've got Solaris with telnet running, you could be in for a big surprise. There is a fairly trivial Solaris telnet 0-day exploit in the wild [.pdf]. "This was posted to Full-Disclosure. Remote root exploit in the Solaris 10/11 telnet daemon. It doesn't require any skill, any exploit knowledge, and can be scripted for mass attacks. Basically if you pass a '-fusername' as an argument to the l option you get full access to the OS as the user specified. In my example I do it as bin but it worked for regular users, just not for root. This combined with a reliable local privilege escalation exploit would be devastating. Expect mass scanning and possibly the widespread exploitation of this vulnerability."
Permalink for comment 212205
To read all comments associated with this story, please click here.
RE[2]: This is not an Exploit
by Priest on Tue 13th Feb 2007 09:31 UTC in reply to "RE: This is not an Exploit"
Priest
Member since:
2006-05-12

>"Telnetd is enabled by default on Solaris 10."

I don't believe this is the case, but without doing a fresh install I can't be positive.

Can anyone else comment on this?

Reply Parent Score: 2