FBI flags top 20 security holes in Windows, Unix
- By William Jackson
- Oct 04, 2002
The FBI's National Infrastructure Protection Center and the SANS Institute of Bethesda, Md., last week updated their top IT vulnerabilities in Microsoft Windows and Unix systems.
The most common Windows targets are Internet Information Services, Data Access Components, SQL Server, unprotected Windows network sharing, anonymous log-on, weak hashing in LAN Manager authentication, weak passwords, Internet Explorer, remote registry access and Windows Scripting Host.
The top Unix targets are remote procedure calls, Apache Web Server, Secure Shell, Simple Network Management Protocol, File Transfer Protocol, trust relationships in remote services, line printer daemon, sendmail, Berkeley Internet Name Domain/Domain Name Service and weak passwords.
Fixes and defenses for these vulnerabilities appear at www.sans.org/top20
William Jackson is freelance writer and the author of the CyberEye blog.