[Snort-sigs] Sourcefire VRT Certified Rules Update

Sourcefire VRT research at ...435...
Mon Feb 12 18:50:12 EST 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sourcefire VRT Certified Rules Update

Synopsis:
The Sourcefire Vulnerability Research Team (VRT) is aware of a
vulnerability affecting Sun Solaris systems.


Details:
Sun Solaris Telnet Authentication Bypass:
Sun Solaris systems are vulnerable to an authentication bypass
vulnerability in the Telnet daemon. The issue may be exploited by a
remote attacker who is able to use telnet to connect to the targeted
machine. Exploit software is not required.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified as SID 10136.


New rules:
10136 <-> TELNET login environment variable authentication bypass
attempt (telnet.rules)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFF0P00Mpm0ve0NhMcRAnvzAJ0S7tMqYT6ktOpFJq+tHc0zSSzMxwCgp0r6
TglX9p2EZgg23KamxQTYNmM=
=ig3R
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list