How to solve the telnet Vulnerability (1)

Source: Internet
Author: User

The telnet Vulnerability has always been our concern. How can this problem be solved? Next we will sort out and share the articles of a netizen. I hope to discuss this issue with you here. For more information, see the following section.

Early versions of Solaris 2.6, 7, and 8 have a telnetd Vulnerability. You can bypass the verification using the environment variable TTYPROMPT of/bin/login. As a result, you can log on without authentication. Recently, telnet on Solaris 10 was found to have a vulnerability, and Sun also released a patch in time.

Let's first look at the symptoms of the problem. The system environment where the vulnerability occurs is Solaris 10 or later. The default installation is not selected during installation. The vulnerability occurs when you specify any "-fusername" parameter after the-l option of the Solaris telnet command, you can directly log on to the Solaris system.

Command Format:

 
 
  1. telnet -l "-fbin" target_address 

The following is a demonstration of using the telnet Vulnerability to log on to the system as a bin user.

 
 
  1. # telnet -l "-fbin" myhost  
  2. Trying 172.21.60.120...  
  3. Connected to myhost.  
  4. Escape character is '^]'.  
  5. Sun Microsystems Inc.  SunOS 5.10 Generic January 2005  
  6. $ id -a  
  7. uid=2(bin) gid=2(bin) groups=2(bin),3(sys) 

If the Administrator modifies the/etc/default/login file and comment out the CONSOLE line to allow root remote logon, the visitor can use this vulnerability to directly log on to the system as root, this poses greater harm to the system.

Kingsley first provided the source code of the vulnerability found in OpenSolaris and called it a "0-day"-zero-day vulnerability. Article address: http://www.com-winner.com/0day_was_the_case_that_they_gave_me.pdf

A script is provided in this Article. After running the script, the user can obtain the adm user permission of the logged-on system.

Solution:

1. disable the telnet service for Solaris 10.

Check whether the local telnet service is enabled.

 
 
  1. # svccfg list | grep telnet  
  2. network/telnet  
  3. # svcs -l network/telnet  
  4. fmri svc:/network/telnet:default  
  5. name Telnet server  
  6. enabled true  
  7. stateonline  
  8. next_state  none  
  9. state_time  Mon Feb 26 03:50:13 2007  
  10. restartersvc:/network/inetd:default 

Disable the telnet service.

 
 
  1. # svcadm disable svc:/network/telnet:default 

2. download and install the Sun Security Patch, which must be supported by the Sun service ).


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.