[8956] in bugtraq
Re: SUN almost has a clue! (automountd) (fwd)
daemon@ATHENA.MIT.EDU (Bojan Zdrnja)
Tue Jan 5 13:37:06 1999
Date: Tue, 5 Jan 1999 10:11:10 +0100
Reply-To: Bojan Zdrnja <bzdrnja@ZESOI.FER.HR>
From: Bojan Zdrnja <bzdrnja@ZESOI.FER.HR>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <Pine.BSI.4.05.9901041709490.10151-100000@user1.inficad.com>;
from Robert Borrell on Mon, Jan 04, 1999 at 05:16:07PM -0700
On 0, Robert Borrell <borrell@POBOX.COM> wrote:
> To all on the list,
>
> I tested the exploited listed below on Solaris 2.6 sparc platforms and I
> could NOT replicate the results from below. The systems have the latest
> Solaris 2.6 recommended cluster.
I tested same exploit on Solaris 2.6 machines and it worked. Maybe you
haven't read carefully enough exploit explanations. You *have to* DNS spoof
attacking machine (or just put it into /etc/hosts for testing).
If you try attacking remote machine without DNS spoofing it just won't work.
You can find some logs in /var/adm/messages, I already see various people
trying this exploit on my machines :-(.
Reboot attempt worked successfully and left this in log:
Jan 5 09:56:20 testmachine reboot: rebooted by LOGIN
Also, machine I tested exploit on was *fully* patched Solaris 2.6 machine.
Regards, Bojan
--
E-mail: bzdrnja@zems.fer.hr (world address)
WHERE DREAMS COME TRUE | URL: | Funky technician
AND MUSIC NEVER STOPS | http://fly.cc.fer.hr/~ld/ | is back!