Routed append vulnerability allows remote file manipulation |
---|
Risk Level: | Medium | Check or Attack Name: RipAppend |
---|---|---|
Platforms: | Unix, IRIX: 3.x, IRIX: 4.x, IRIX: 5.x, IRIX: 6.0.1, IRIX: 6.1, IRIX: 6.2, IRIX: 6.3, IRIX: 6.4, IRIX: 6.0 | |
Description: | Many routed daemons that have been ported from the original 4.x BSD routed code have the ability for a packet to turn on debug mode, and to specify a debugging log file. Attackers can append data to system files without any checks on the permissions of the file. |
|
Remedy: | Contact your vendor for fix information. IRIX users of affected but unsupported versions should upgrade to the latest release available for your hardware and then install the patch (if necessary). Other IRIX users should obtain and apply the following patches:
|
|
References: | Fyodor's Exploit World, routed trace file exploit, http://www.insecure.org/sploits/routed.tracefile.html Rootshell Web Site, BSD 4.4 based routed trace file exploit, http://www.rootshell.com/archive-j457nxiqi3gq59dv/199801/riptrace.c.html Silicon Graphics Inc. Security Advisory 19981004-01-PX, IRIX routed(1M) Vulnerability, ftp://sgigate.sgi.com/security/19981004-01-PX CIAC Information Bulletin J-012, J-012: SGI IRIX routed(1M) Vulnerability, http://ciac.llnl.gov/ciac/bulletins/j-012.shtml |
Know Your Risks |