[14979] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Standard & Poors security nightmare

daemon@ATHENA.MIT.EDU (Richard Seaman, Jr.)
Mon May 22 02:43:32 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000521081911.D2883@seaman.org>
Date:         Sun, 21 May 2000 08:19:11 -0500
Reply-To: "Richard Seaman, Jr." <dick@SEAMAN.ORG>
From: "Richard Seaman, Jr." <dick@SEAMAN.ORG>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000520180900.B2883@seaman.org>; from dick@seaman.org on Sat,
              May 20, 2000 at 06:09:00PM -0500

On Sat, May 20, 2000 at 06:09:00PM -0500, Richard Seaman, Jr. wrote:
[snip]

> Many of these problems still exist.  However, they have disabled at least
> some unneeded services, including named, apache and sendmail.  samba is
> still on, but unneeded.  Likewise for nfsd.  I have disabled both without
> adverse effect.  World writeable directories and files are still a problem
> (eg. /etc/rc.d/rc.local was world writeable).

One other thing I forgot about.  They have lots of stuff turned on in inetd.conf.
It can all be turned off without any ill effect on the MCSP function.

[snip]

> For sat feed customers, I'd say that
> changing the passwords, disabling samba and nfsd, and keeping the MCSP
> "outside" interface behind a firewall on a "trusted network" will
> reduce the vulnerabilities dramatically as compared to the MCSP setup
> you analyzed.

Plus turn off inetd, or else turn off everything in inetd.conf you don't need.


--
Richard Seaman, Jr.        email: dick@seaman.org
5182 N. Maple Lane         phone:    262-367-5450
Nashotah WI 53058            fax:    262-367-5852

home help back first fref pref prev next nref lref last post