Worm Exploiting Solaris Telnetd Vulnerability 164
MichaelSmith writes "Several news sites are reporting that a worm is starting to exploit the Solaris Telnet 0-day vulnerability. By adding simple text to the Telnet command, the system will skip asking for a username and password. If the systems are installed out of the box, they automatically come Telnet-enabled. 'The SANS Internet Storm Center, which monitors Internet threats, has noticed some increase in activity on the network port used by Solaris' telnet feature, according to an ISC blog posted on Tuesday. "One hopes that there aren't that many publicly reachable Solaris systems running telnet," ISC staffer Joel Esler wrote.'"
Sun don't shine (Score:0, Funny)
Oh no (Score:4, Funny)
Re:It's been a long day... (Score:4, Funny)
They are still searching.
telwhat? (Score:3, Funny)
What year is it?
Re:Other Telnet vulnerabilities (Score:4, Funny)
Re:Yep. (Score:4, Funny)
Re:*Cough* Microsoft *Cough* (Score:3, Funny)
Re:Yep. (Score:3, Funny)
Stop repeating that!
They don't use telnet, and that plaintext you see when sniffing their network is your natural ability to crack encryption.
How many times do I have to tell you that you're special?!
Now, back to the task I've given you. The NSA won't be lending me your brain again if you spend all my alloted time on