SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : All About Sun Microsystems -- Ignore unavailable to you. Want to Upgrade?


To: Brian Sullivan who wrote (42854)4/9/2001 5:08:01 PM
From: Charles Tutt  Respond to of 64865
 
Whatever. I think your favorite, Microsoft, gets most of its money from two closely related products -- Windows and Office. In fact, I suspect they're more concentrated than Sun. Not that many of the buggy Sun chips are out there, so the fix shouldn't be too hard. I'm considering putting more eggs in the basket -- but I want to pick my time. Maybe just before the market close for the long weekend (it's closed Friday, isn't it?).

If Microsoft is any indication, I would say software is very hard to patch. In fact, I think many of their patches introduce more bugs. Spaghetti ("integrated" if you want to be euphemistic) code will do that for you.

JMHO.

Charles Tutt (TM)



To: Brian Sullivan who wrote (42854)4/9/2001 9:18:47 PM
From: DiViT  Read Replies (1) | Respond to of 64865
 
CERT® Advisory CA-2001-05 Exploitation of snmpXdmid

Original release date: March 30, 2001
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected
Any machine running Solaris 2.6, 7, or 8 with snmpXdmid installed and enabled. snmpXdmid is installed and enabled by default on these systems.

[snip]

II. Impact
A local or remote user that is able to send packets to the snmpXdmi daemon on a system may gain root privileges.

III. Solution
Apply a patch from Sun when it is available
Sun has been notified of this issue and is actively working on patches to address the problem. This advisory will be updated when patches are available.

cert.org