Remote file access through selection service |
---|
Risk Level: | Medium | Check or Attack Name: selsvcvuln |
---|---|---|
Platforms: | SunOS: 4.1.2 and below | |
Description: | The Selection service (selection_svc or selnsvc) was found to be vulnerable. This service allows readable files to be grabbed remotely. |
|
Remedy: | Disable the service by placing a # at the beginning of the appropriate line in the file /etc/inetd.conf, and then send the SIGHUP signal to the inetd process, or obtain a patch from the vendor. |
|
References: | CERT Advisory CA-90.05, SunView selection_svc vulnerability, http://www.cert.org/ftp/cert_advisories/CA-90:05.sunselection.vulnerability SunOS Patch ID # 100085-XX, , http://www.cert.org/ftp/cert_advisories/CA-90:05.sunselection.vulnerability |
Know Your Risks |