There is a vulnerability in Solaris's ff.core utility which allows normal users to execute the rename command as root. This particular bug when levereged against a series of other configuration issues in a standard Solaris setup can lead to a root compromise. An example of tthis attack excecuted via the ff.core rename attack coul.d be as follows: 1. rename /usr/bin/sh /usr/bin/admintool 2. rename /usr/sbin/swmtool /usr/sbin/in.rlogind 3. telnet localhost login and clean up Detailed messages concerning this problem and related fixes are attached to this Vulnerability in the Referance section.
There is a vulnerability in Solaris's ff.core utility which allows normal users to execute the rename command as root. This particular bug when levereged against a series of other configuration issues in a standard Solaris setup can lead to a root compromise. An example of tthis attack excecuted via the ff.core rename attack coul.d be as follows: 1. rename /usr/bin/sh /usr/bin/admintool 2. rename /usr/sbin/swmtool /usr/sbin/in.rlogind 3. telnet localhost login and clean up Detailed messages concerning this problem and related fixes are attached to this Vulnerability in the Referance section.