SANS Top 10 Threats
In case you're wondering which threats are enshrined in this
year's SANS top 10:
1. BIND weaknesses -- nxt, qinv, and in.named
allow immediate root compromise.
2. Vulnerable CGI programs and application extensions (e.g., ColdFusion)
installed on Web servers.
3. Remote Procedure Call (RPC) weaknesses in rpc.ttdbserverd
(ToolTalk), rpc.cmsd (Calendar Manager), and rpc.statd
that allow immediate root compromise.
4. RDS security hole in Microsoft Internet Information Server
(IIS).
5. Sendmail and MIME buffer overflows as well as pipe attacks
that allow immediate root compromise.
6. sadmind and mountd.
7. Global file sharing and inappropriate information sharing via
NetBIOS and Windows NT ports 135->139 (445 in Windows 2000),
or UNIX NFS exports on port 2049, or Macintosh Web sharing or AppleShare/IP
on ports 80, 427, and 548.
8. User IDs, especially root/administrator with no passwords or
weak passwords.
9. IMAP and POP buffer overflow vulnerabilities or incorrect configuration.
10. Default SNMP community strings set to public and private.
For more on the SANS top 10 list, see http://www.sans.org/topten.htm.
|