?? 2032.txt
字號:
Rule:--Sid:2032--Summary:The rpc.ypasswd service is used to update user information remotely. This service should not be available outside the local area network, external source.--Impact:This may be an intelligence gathering activity on available rpc servicesexists that an attacker may already have gained access to a NIS server and thus all resources connected to that host.--Detailed Information:A vulnerability exists in some versions of the rpc.ypasswd service thatcan lead to a remote root compromise of a vulnerable host. This activitymay be an intelligence gathering exercise to ascertain wether or not thehost is vulnerable to this attack.This activity may also indicate a possible compromise of a NIS server via a legitimate user account the attacker has previously garnered. Compromise of a master NIS server may present the attacker with easy access to all NIS resources the machine is connected to.--Affected Systems:All systems running the rpc.ypasswd service.--Attack Scenarios:The attacker can make a request to update user information via rpc.ypasswd.--Ease of Attack:Simple--False Positives:None Known--False Negatives:None Known--Corrective Action:Disable the rpc.ypasswd daemon.Disallow all RPC requests from external sources and use a firewall to block access to RPC ports from outside the LAN.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:SANS:http://www.sans.org/rr/unix/NIS.phphttp://www.sans.org/rr/unix/sec_solaris.php--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -