Remote file access through selection service

Risk Level: Medium risk vulnerability  Medium

Check or Attack Name: selsvcvuln

Platforms: SunOS: 4.1.2 and below
Description:

The Selection service (selection_svc or selnsvc) was found to be vulnerable. This service allows readable files to be grabbed remotely.

Remedy:

Disable the service by placing a # at the beginning of the appropriate line in the file /etc/inetd.conf, and then send the SIGHUP signal to the inetd process, or obtain a patch from the vendor.

References:

CERT Advisory CA-90.05, SunView selection_svc vulnerability, http://www.cert.org/ftp/cert_advisories/CA-90:05.sunselection.vulnerability

SunOS Patch ID # 100085-XX, , http://www.cert.org/ftp/cert_advisories/CA-90:05.sunselection.vulnerability


X-Force Logo
Know Your Risks