19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.41 Misuse of a UNIX system with the help of<br />

uucp<br />

<strong>The</strong> UUCP (UNIX-to-UNIX copy) software package allows an exchange of<br />

ASCII and binary files between <strong>IT</strong> systems and the execution of commands on<br />

remote <strong>IT</strong> systems. UUCP was originally implemented on UNIX systems but<br />

is now available for many other operating systems. During communication via<br />

UUCP, <strong>IT</strong> users at remote computers get privileges for the local computer. If<br />

these rights are not granted carefully, or restricted to a bare minimum, the<br />

local system is in danger of being misused. Masquerading via UUCP, e.g. by<br />

feigning a host using the relevant password, is also conceivable.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!