Amidst reports on a worm squirming through a code execution hole in the Solaris 10/11 telnet daemon
(in.telnetd), Sun Microsystem has released an inoculation script for systems that might still be unpatched.
In an alert issued today, Sun confirmed it was aware of an "active worm" exploiting the vulnerability, which was patched earlier this month.
The inoculation script was released along with instructions on how to determine if a Solaris 10 or Nevada system may be infected.
According to Arbor Networks, the worm attempts to log into your systems as the users "lp" or "adm" and execute a bunch of shell commands on unpatched systems.
The advice to IT admins: Patch now or simply disable Telnet.