Linked by Thom Holwerda on Mon 12th Feb 2007 18:30 UTC, submitted by stare
Sun Solaris, OpenSolaris If you've got Solaris with telnet running, you could be in for a big surprise. There is a fairly trivial Solaris telnet 0-day exploit in the wild [.pdf]. "This was posted to Full-Disclosure. Remote root exploit in the Solaris 10/11 telnet daemon. It doesn't require any skill, any exploit knowledge, and can be scripted for mass attacks. Basically if you pass a '-fusername' as an argument to the l option you get full access to the OS as the user specified. In my example I do it as bin but it worked for regular users, just not for root. This combined with a reliable local privilege escalation exploit would be devastating. Expect mass scanning and possibly the widespread exploitation of this vulnerability."
Permalink for comment 212257
To read all comments associated with this story, please click here.
RE[3]: This is not an Exploit
by jziegler on Tue 13th Feb 2007 13:05 UTC in reply to "RE[2]: This is not an Exploit"
jziegler
Member since:
2005-07-14

Yes, it is. If you install S10, S10u1 or S10u2, the "full install", in.telnetd is running. Only in the latest release, S10u3, you have the option to install it "secure by default". In that case, the only internet-listening daemon is sshd. All other are either stopped, or are listening on 127.0.0.1 only.

Reply Parent Score: 2