Bootparam supplies domain name |
---|
Risk Level: | Low | Check or Attack Name: bootpdom |
---|---|---|
Platforms: | Unix | |
Description: | Bootparam supplied the domain name for NIS. With the domain name, an attacker can get NIS to provide the password file. |
|
Remedy: | Disable bootparamd, if it is not required as a server for diskless clients, or patch NIS. Several vendors have added access control to their NIS implementation. Check your system documentation or the vendorÆs patch list. The control file is sometimes called securenets. As a workaround, consider the following suggestions: |
|
References: | CERT Advisory CA-92.13, SunOS NIS Vulnerability, http://www.cert.org/ftp/cert_advisories/CA-92:13.SunOS.NIS.vulnerability CERT Advisory CA-93.01, Revised Hewlett-Packard NIS ypbind Vulnerability, http://www.cert.org/ftp/cert_advisories/CA-93:01.REVISED.HP.NIS.ypbind.vulnerability AUSCERT Advisory AA-95.03, An overview of SATAN, http://ftp.sunet.se/pub/security/csir/auscert/auscert-advisory/AA-95.03.An.overview.of.SATAN |
Know Your Risks |