There is a major zero day bug announced in solaris 10 and 11 with the telnet and login combination. It has been verified. The issue: The telnet daemon passes switches directly to the login process which looks for a switch that allows root to login to any account without a password. If your telnet daemon is running as root it allows unauthenticated remote logins. Telnet should be disabled. Since 1994 the cert.org team has recommended using something other then plain text authentication due to potential network monitoring attacks. http://www.cert.org/advisories/CA-1994-01.html “We recognize that the only effective long-term solution to prevent these attacks is by not transmitting reusable clear-text passwords on the network.“ If remote shell access is required ssh is a better choice then telnet. We have done articles about securing ssh in the past. http://isc.sans.org/diary.html?storyid=1541 The FIX: To disable telnet in solaris 10 or 11 this command should work. svcadm disable tel...
a seconds that's worth to remember ...