home *** CD-ROM | disk | FTP | other *** search
- This file: cert.org:/pub/cert_advisories/01-README
-
- This directory contains an archive of all the advisories CERT has
- put out since December 1988. It also contains several files with
- general information about the CERT Coordination Center.
-
- Please note that the Sun patches are no longer available on
- uunet.uu.net. They are available on ftp.uu.net, whose IP address is
- no longer 192.48.96.2, but 137.39.1.9. Also, the files are not in
- the /sun-dist directory, but in the /systems/sun/sun-dist
- directory.
-
- A listing and short description of each advisory follows:
-
- CA-88:01.ftpd.hole 12/88
- Warning about BSD sendmail 5.59 debug command; general warning
- about getting latest version of ftpd; other general warnings.
-
- CA-89:01.passwd.hole 01/89
- Report from Keith Bostic of BSD patch for passwd(1) program.
-
- CA-89:02.sun.restore.hole 07/26/89
- Vulnerability in SunOS 4.0.* restore(8) command.
-
- CA-89:03.telnet.breakin.warning 08/16/89
- Warning about a series of break-ins in which an intruder replaced
- the telnet(1) program with a Trojan horse that captured
- passwords. Contains some general hints about securing systems.
-
- CA-89:04.decnet.wank.worm 10/17/89
- Warning about the "WANK" worm which attacked DECnet hosts.
-
- CA-89:05.ultrix3.0.hole 10/17/89
- Warning about attacks on DEC/Ultrix 3.0 machines. Advises users
- to check for Trojan horses, insecure tftp, simple passwords.
-
- CA-89:06.ultrix3.0.update 10/18/89
- A repost of the 10/17 Ultrix advisory with checksums for several
- Ultrix system programs.
-
- CA-89:07.sun.rcp.vulnerability 10/26/89
- Vulnerability in SunOS 4.0.x rcp command.
-
- CA-90:01.sun.sendmail.vulnerability 01/29/90
- Vulnerability in SunOS 3.* and 4.0.* sendmail.
-
- CA-90:02.intruder.warning 03/19/90
- Warning about a series of attacks on Internet systems. Includes
- a list of 14 points to check on Unix and VMS systems. The points
- cover possible signs of a break-in as well as possible system
- configuration vulnerabilities.
-
- CA-90:03.unisys.warning 05/07/90
- Warning about Unisys U5000 systems. Some of the logins supplied
- when the system was shipped did not have passwords, and intruders
- were taking advantage of this vulnerability.
-
- CA-90:04.apollosuid.vulnerability 07/27/90
- Vulnerability in Hewlett Packard/Apollo Domain/OS version sr10.2
- and some beta versions of sr10.3. File /etc/suid_exec contained
- a security flaw.
-
- CA-90:05.sunselection.vulnerability 08/14/90
- Vulnerability in SunOS 3.*, 4.0.3, and 4.1 SunView selection_svc
- facility.
-
- CA-90:06a.NeXT.vulnerability 10/03/90
- Describes several vulnerabilities in NeXT system software. The
- advisory was originally issued as 90:06; 90:06a includes several
- corrections.
-
- CA-90:07.VMS.ANALYZE.vulnerability 10/25/90
- Vulnerability in DEC VMS versions 4.0 through 5.4. Problem with
- ANALYZE/PROCESS_DUMP routine.
-
- CA-90:08.irix.mail 10/31/90
- Vulnerability in Silicon Graphics IRIX 3.3 and 3.3.1 systems.
- /usr/sbin/Mail has a security flaw.
-
- CA-90:09.vms.breakins.warning 11/09/90
- Warning about techniques intruders were using to get access to
- VMS systems. No new vulnerabilities described; intruders were
- using weak password attacks.
-
- CA-90:10.attack.rumour.warning 11/16/90
- Message about alleged attacks on telephone systems. No evidence
- that rumors were substantiated.
-
- CA-90:11.Security.Probes 12/10/90
- Many sites on the Internet received messages on Sunday, December 9. The
- messages stated that a group of researchers and students were testing
- for a "common bug" in network hosts.
-
-
- CA-90:12.SunOS.TIOCCONS.vulnerability 12/21/90
- This Advisory was a rebroadcast of a Sun Microsystems, Inc. Security
- Bulletin announcing the availability of a patch that corrects a problem
- with TIOCCONS.
-
- Problem Description: TIOCCONS can be used to re-direct console output/input
- away from "console"
-
- CA-91:01a.SunOS.mail.vulnerability 02/22/91
- This Advisory was a rebroadcast of a Sun Microsystems, Inc. Security
- Bulletin announcing the availability of patch that corrects a problem
- with /bin/mail.
-
- CA-91:02a.SunOS.telnetd.vulnerability 03/26/91
- This Advisory announced a security problem with the in.telnetd program
- in releases of SunOS 4.1 and 4.1.1.
-
- CA-91:03.unauthorized.password.change.request 04/04/91
- This advisory addresses recent bogus email messages which have been
- distributed on the Internet. The messages request that the user
- change his/her password, and appear to come from the system admin.
-
- CA-91:04.social.engineering 04/18/91
- This advisory is an addition to CA-91:03. It addresses more bogus
- Internet email scams and urges system administrators to warn their
- users.
-
- CA-91:05.Ultrix.chroot.vulnerability 05/01/91
- Corrects improper installation of /usr/bin/chroot for Ultrix
- versions 4.0 and 4.1.
-
- CA-91:06.NeXTstep.vulnerability 05/14/91
- Addresses three vulnerabilities in NeXT systems running various
- versions of NeXTstep. Affected are: rexd(8C), /private/etc,
- username "me".
-
- CA-91:07.SunOS.source.tape.vulnerability 05/20/91
- Fixes a security vulnerability on SunOS (4.0.3, 4.1, and 4.1.1)
- systems which have installed the Sun Source tapes.
-
- CA-91:08.systemV.login.vulnerability 05/23/91
- Addresses a vulnerability in all System V Release 4 versions of
- /bin/login. Patch provided by AT&T.
-
- CA-91:09.SunOS.rpc.mountd.vulnerability 07/15/91
- This advisory has since been superseded by CA-92:12.
-
- CA-91:10.SunOS.lpd.vulnerability 07/15/91
- CA-91:10a.SunOS.lpd.vulnerability 09/12/91
- Vulnerability in SunOS 4.0.3, 4.1, and 4.1.1 /usr/lib/lpd.
- Patched versions are available. Version 10a of this advisory
- supersedes all prior versions.
-
- CA-91:11.Ultrix.LAT-Telnet.gateway.vulnerability 08/14/91
- Vulnerability in Ultrix LAT/Telnet gateway software on
- all Ultrix 4.1 and 4.2 systems. Patch available directly from
- DEC.
-
- CA-91:12.Trusted.Hosts.Configuration.vulnerability 08/22/91
- Vulnerability in MANY Unix systems regarding the use of
- a minus sign ("-") as the first character in any hosts.equiv
- hosts.lpd, and/or .rhosts files. Workaround is to re-arrange
- the lines in these files such that the "-" is not the
- first character in the file.
-
- CA-91:13.Ultrix.mail.vulnerability 08/23/91
- Vulnerability in /usr/bin/mail on all Ultrix versions prior to 4.2.
- Problem is fixed in Ultrix 4.2 and a patch is available from DEC
- for 4.1.
-
- CA-91:14.IRIX.mail.vulnerability 08/26/91
- Vulnerability regarding the handling of mail messages on
- all Silicon Graphics IRIX Systems prior to version 4.0.
- The problem is fixed in version 4.0. Solution involves
- changing permissions and ownership of a system command.
-
- CA-91:15.NCSA.Telnet.vulnerability 09/10/91
- Vulnerability in PC and Mac telnet program by NCSA. This
- advisory details a workaround.
-
- CA-91:16.SunOS.SPARC.Integer_Division.vulnerability 09/18/91
- Vulnerability in Sun's integer division emulation code on
- SPARC platforms running SunOS 4.1 and 4.1.1. Patch available
- from Sun and on ftp.uu.net.
-
- This patch is no longer available. It has been obsoleted by
- patches described in the
- CA-92:15.Multiple.SunOS.vulnerabilities.patched advisory.
-
- CA-91:17.DECnet-Internet.Gateway.vulnerability 09/26/91
- Vulnerability in Ultrix DECnet to Internet gateway software.
- This advisory details a workaround. The vulnerability affects
- Ultrix versions 4.0, 4.1, and 4.2.
-
- CA-91:18.Active.Internet.tftp.Attacks 09/27/91
- Warning about automated tftp probes for /etc/passwd to Internet
- sites throughout the world. Urges all sites to carefully check
- their system configurations concerning tftp usage. Indicates
- how sites can secure their tftp configurations.
-
- CA-91:19.AIX.TFTP.Daemon.vulnerability 10/17/91
- Vulnerability in the TFTP daemon in all versions of AIX for
- IBM RS/6000 machines. Patch available from IBM for all AIX
- releases from "GOLD" to the current release.
-
- CA-91:20.rdist.vulnerability 10/22/91
- A vulnerability concerning /usr/ucb/rdist (the location of rdist
- may vary depending on the operating system). This vulnerability is
- present in possibly all versions of rdist. Advisory details those
- vendors that don't ship rdist, those providing patches, and a workaround
- for all other versions of rdist.
-
- CA-91:21.SunOS.NFS.Jumbo.and.fsirand 12/06/91
- Vulnerabilities concerning Sun Microsystems, Inc. (Sun) Network
- File System (NFS) and the fsirand program. These vulnerabilities
- affect SunOS versions 4.1.1, 4.1, and 4.0.3 on all architectures.
- Patches are available for SunOS 4.1.1. An initial patch for SunOS
- 4.1 NFS is also available. Sun will be providing complete patches
- for SunOS 4.1 and SunOS 4.0.3 at a later date.
-
- CA-91:22.SunOS.OpenWindows.vulnerability 12/16/91
- A vulnerability is present in Sun's OpenWindows software version 3.0.
- This problem is present in sun4 and sun4c systems running
- SunOS 4.1.1. A patch from Sun is available.
-
- CA-91:23.Apollo.crp.vulnerability 12/18/91
- A vulnerability is present in the crp system in Hewlett Packard/Apollo
- Domain/OS in all SR10 versions. A workaround is available and
- patches for SR10.3 and SR10.4 will be available from Apollo
- at a future date.
-
- CA-92:01.NeXTstep.configuration.vulnerability 01/20/92
- A vulnerability is present in the default configuration in
- release 2 of NeXTstep's NetInfo. The advisory indicates where
- a description of how to configure NetInfo correctly can be obtained.
-
- CA-92:02.Michelangelo.PC.virus.warning 02/06/92
- This advisory warns users of a PC virus called Michelangelo.
- The virus affects IBM PCs and compatibles, and has a trigger
- date of March 6 (any year).
-
- CA-92:03.Internet.Intruder.Activity 02/17/92
- Warning about a significant intrusion incident on the Internet.
- Urges all system administrators to check their systems for the
- signs of intrusion detailed in the advisory.
-
- CA-92:04.ATT.rexecd.vulnerability 02/25/92
- A vulnerability is present in AT&T TCP/IP Release 4.0 running
- on SVR4 systems for both the 386/486 and 3B2 RISC platforms.
- The problem is in the remote execution server /usr/etc/rexecd
- and a new version of rexecd is available from AT&T.
-
- CA-92:05.AIX.REXD.Daemon.vulnerability 03/05/92
- The rexd daemon may be enabled by default in versions 3.1 and 3.2
- of AIX for IBM RS/6000 machines. The advisory describes a fix for
- the problem and details how to obtain a patch for the problem from
- IBM.
-
- CA-92:06.AIX.uucp.vulnerability 03/19/92
- A vulnerability is present in the UUCP software in versions of
- AIX up to 2007. The advisory describes how to disable UUCP and
- details how to obtain a patch for the problem from IBM.
-
- CA-92:07.AIX.passwd.vulnerability 03/31/92
- A vulnerability is present in the passwd command in AIX 3.2 and
- the 2007 update of AIX 3.1. The advisory describes how to disable
- the /bin/passwd until you obtain and install the patch for the
- problem from IBM.
-
- CA-92:08.SGI.lp.vulnerability 04/10/92
- A vulnerability is present in the default configuration of the lp
- software in Silicon Graphics Computer Systems (SGI) IRIX operating
- systems. This vulnerability is present in all versions of IRIX,
- prior to IRIX 4.0.5. The advisory describes how to reconfigure the
- lp software in order to eliminate this vulnerability.
-
- CA-92:09.AIX.anonymous.ftp.vulnerability 04/27/92
- A vulnerability is present in the anonymous FTP configuration in all
- versions of AIX. The advisory describes how to obtain a patch for
- the problem from IBM.
-
- CA-92:10:AIX.crontab.vulnerability 05/26/92
- A vulnerability is present in crontab(1) in version 3.2 of AIX.
- This advisory describes how to implement a workaround for the
- problem until you obtain the patch for the problem from IBM.
-
- CA-92:11:SunOS.Environment.vulnerability 05/27/92
- A vulnerability involving environment variables and setuid/setgid
- programs exists on all Sun architectures running SunOS 4.0 and
- higher. The advisory details how to obtain patches for SunOS
- programs which are known to be impacted by the vulnerability.
- The advisory contains a workaround to protect vulnerable binaries
- for which patches are unavailable for your SunOS version, or for
- local or third party software which may be vulnerable.
-
- CA-92:12.REVISED.SunOS.rpc.mountd.vulnerability 05/28/92
- A vulnerability is present in SunOS 4.1, 4.1.1, and 4.1.2
- /usr/etc/rpc.mountd. The advisory describes how to obtain a
- patch for the problem from Sun.
-
- CA-92:13.SunOS.NIS.vulnerability 06/04/92
- Vulnerabilities are present in NIS under SunOS 4.1, 4.1.1, and
- 4.1.2, and may or may not exist in earlier versions of NIS. The
- advisory describes how to obtain a patch for SunOS 4.1, 4.1.1, and
- 4.1.2 for the problem from Sun.
-
- CA-92:14.Altered.System.Binaries.Incident 06/22/92
- Warning about a significant intrusion incident on the Internet.
- Urges all system administrators to check their systems for the
- signs of intrusion detailed in the advisory.
-
- CA-92:15.Multiple.SunOS.vulnerabilities.patched 07/21/92
- This advisory describes how to obtain various patches for SunOS 4.1,
- 4.1.1, and 4.1.2 for all Sun architectures. As the application of
- these patches involves rebuilding your system kernel, it is
- recommended that you apply all patches simultaneously.
-
- This advisory obsoletes the
- CA-91:16.SunOS.SPARC.Integer_Division.vulnerability advisory.
-
- CA-92:16.VMS.Monitor.vulnerability 09/22/92
- A vulnerability is present in the Monitor utility in VMS V5.0 through
- V5.4-2, but has been corrected in V5.4-3 through V5.5-1. This advisory
- details a workaround for those customers who are unable to upgrade
- their systems to a version of VMS which does not have the problem.
-
- This advisory has been obsoleted by the
- CA-92:18.VMS.Monitor.vulnerability.update advisory.
-
-
- CA-92:17.HP.NIS.ypbind.vulnerability 10/05/92
- A vulnerability is present in Hewlett-Packard's HP/UX Operating
- System for series 300, 700, and 800 computers, which allows
- remote NIS servers unauthorized access to local NIS hosts. The
- advisory describes how to obtain a patch for the problem from HP.
-
- This advisory has been obsoleted by the
- CA-93:01.REVISED.HP.NIS.ypbind.vulnerability advisory.
-
-
- CA-92:18.VMS.Monitor.vulnerability.update 11/17/92
- This advisory provides additional information concerning availability
- of remedial image kits to correct a vulnerability present in the Monitor
- utility in VMS V5.0 through V5.4-2. The vulnerability has been corrected
- in V5.4-3 through V5.5-1.
-
- This advisory obsoletes the CA-92:16.VMS.Monitor.vulnerability
- advisory.
-
- CA-92:19.Keystroke.Logging.Banner.Notice 12/07/92
- This advisory provides information from the United States Department of
- Justice, General Litigation and Legal Advice Section, Criminal Division,
- regarding keystroke monitoring by computer systems administrators, as a
- method of protecting computer systems from unauthorized access.
- CERT strongly suggests adding a notice banner such as the one included in
- the advisory to all systems. Sites not covered by U.S. law should consult
- their legal counsel.
-
- CA-92:20.Cisco.Access.List.vulnerability 12/10/92
- This advisory provides information concerning a vulnerability in Cisco
- router access lists when the "established" keyword is used.
- This vulnerability is present in Cisco software releases 8.2, 8.3, 9.0
- and 9.1. The advisory describes workarounds and provides information on
- how to obtain a patch for the problem from Cisco.
-
- CA-92:21.ConvexOS.vulnerabilities 12/16/92
- This advisory provides information concerning several vulnerabilities in
- ConvexOS/Secure, CONVEX CXbatch, CONVEX Storage Manager (CSM), and
- ConvexOS EMACS. These vulnerabilities can affect ConvexOS versions
- V6.2 - V10.2 and ConvexOS/Secure versions V9.5 and V10.0 on all supported
- architectures. The advisory describes a workaround for one of the
- vulnerabilities and provides information on how to obtain a patches for
- the other problems from CONVEX Computer Corporation.
-
- CA-93:01.REVISED.HP.NIS.ypbind.vulnerability 01/13/93
- A vulnerability is present in Hewlett-Packard's HP/UX Operating
- System for series 300, 700, and 800 computers, which allows
- remote NIS servers unauthorized access to local NIS hosts.
- Patches from HP are available for all of the HP/UX level 8 releases
- (8.0, 8.02, 8.06, and 8.07). The problem is fixed in HP/UX 9.0.
-
- This advisory obsoletes the CA-92:17.HP.NIS.ypbind.vulnerability
- advisory.
-
- CA-93:02a.NeXT.NetInfo._writers.vulnerabilities 01/21/93
-
- This advisory provides information concerning vulnerabilities in the
- distributed printing facility ("_writers" properties) of NeXT
- computers running all releases of NeXTSTEP software through NeXTSTEP
- Release 3.0. The advisory details the availablity of a patch for the
- problems and provides suggested workarounds.
-
- CA-93:03.SunOS.File/Directory.Permissions 02/03/93
-
- This advisory describes a patch that is available to correct
- the ownerships and permissions for a number of system files in
- SunOS 4.1, 4.1.1, 4.1.2, and 4.1.3. These have been fixed in
- SunOS 5.0. CERT has seen an increasing number of attackers
- exploit these problems on systems and we encourage sites to
- consider installing this patch.
-
-
- OTHER FILES
-
- 00-uunet-change.read_first
- Details the change in location of Sun patches via FTP.
-
- 01-README
- This file.
-
- cert-article
- An article about CERT from the March 1990 issue of Bridge, a
- magazine published by the Software Engineering Institute (SEI).
-
- cert.press.release.dec88
- The DARPA press release issued on December 6, 1988 announcing the
- formation of the CERT.
-
- rdist-patch-status
- A status file pertaining to patch availability information for the
- CA-91:20.rdist.vulnerability advisory.
-
- See the pub/info directory for more information on CERT.
-
-
-
-