0-day Vulnerability Effects Solaris – Disable Telnet NOW!


Solaris is pwned by a similar vulnerability to one discovered on AIX systems in 1994.

Yes people that’s 13 years ago…and Sun are still vulnerable, as reported by SANS.

The following will give you root on a lot of Solaris systems:

Cool eh?

The Internet Storm Center is urging system administrators to disable or restrict telnet functionality to contain the zero-day vulnerability, which, according to center, affects only the most recent versions of Solaris and OpenSolaris.

Sun executives talk up secure Solaris at just about every turn. However, some simple tinkering with the OS’s telnet user environment variable can give outsiders free reign with no authentication requirements. No special tools are required to exploit the vulnerability. Sans has long urged against the use of reusable clear-text passwords when administering telnet.

A Sun spokesman says the company has been able to verify the vulnerability and is in the process of testing a fix. He also says that by default telnet is disabled in Solaris 10, and users would have to follow a series of steps to enable it and even more to allow it to administer root privileges. Sun has long recommended Solaris SecureShell as a more secure alternative to telnet.

So disable telnet now, if you haven’t already..Yes I know Sun are still teaching people to use telnet in their classes, which I find kind of sad.

Like someone else said, I doubt any of us would even use telnet on an exposed system…but we have all worked for corporations or seen people that would.

Source: The Register

Posted in: Exploits/Vulnerabilities, Networking Hacking, UNIX Hacking

, ,


Latest Posts:


BloodHound - Hacking Active Directory Trust Relationships BloodHound – Hacking Active Directory Trust Relationships
BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an AD environment.
SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads


Comments are closed.