[Snort-sigs] Sourcefire VRT Certified Rules Update
research at ...435...
Mon Feb 12 18:50:12 EST 2007
-----BEGIN PGP SIGNED MESSAGE-----
Sourcefire VRT Certified Rules Update
The Sourcefire Vulnerability Research Team (VRT) is aware of a
vulnerability affecting Sun Solaris systems.
Sun Solaris Telnet Authentication Bypass:
Sun Solaris systems are vulnerable to an authentication bypass
vulnerability in the Telnet daemon. The issue may be exploited by a
remote attacker who is able to use telnet to connect to the targeted
machine. Exploit software is not required.
A rule to detect attacks targeting this vulnerability is included in
this release and is identified as SID 10136.
10136 <-> TELNET login environment variable authentication bypass
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
More information about the Snort-sigs