Menu
Sun patches Telnet zero-day pronto

Sun patches Telnet zero-day pronto

Patch released three days after vulnerability was announced

Sun Microsystems Tuesday patched a critical bug that could let attackers snatch control of Solaris 10 systems by sending simple commands to the Telnet daemon.

The fix comes just three days after exploit code for the zero-day vulnerability was posted to a security Web site. "Big round of applause for Sun owning up to the mistake and fixing it quickly," said Dave Maynor, chief technology officer at U.S.-based Errata Security, in a blog entry.

A Sun security researcher owned up to the foul-up of leaving Telnet vulnerable.

"Yes, this was an almighty [mess] up and should not have happened," Alan Hargreaves, an engineer in Sun's support group who wrote the initial patch, said in a blog of his own. "It did happen. Let's move on."

Although Hargreaves' patch fixed the bug, security organizations, including US-CERT and Errata Security, recommended that Solaris users also disable the Telnet daemon -- or if they've turned it off, leave it off -- using the command: # svcadm disable svc:/network/telnet:default.

The patch can be downloaded from Sun's support site.


Follow Us

Join the newsletter!

Error: Please check your email address.

Featured

Slideshows

Opening ice breaker sessions set the scene for EDGE 2017

Opening ice breaker sessions set the scene for EDGE 2017

​EDGE 2017 kicked off with an opening ice breaker session, providing a structured environment for channel executives to form and foster new relationships and business opportunities. Photos by Maria Stefina.​

Opening ice breaker sessions set the scene for EDGE 2017
Show Comments