home *** CD-ROM | disk | FTP | other *** search
- ***********************************************************************
- DDN Security Bulletin 9103 DCA DDN Defense Communications System
- 27 Mar 91 Published by: DDN Security Coordination Center
- (SCC@NIC.DDN.MIL) (800) 235-3155
-
- DEFENSE DATA NETWORK
- SECURITY BULLETIN
-
- The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
- Coordination Center) under DCA contract as a means of communicating
- information on network and host security exposures, fixes, & concerns
- to security & management personnel at DDN facilities. Back issues may
- be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.67.67.20]
- using login="anonymous" and password="guest". The bulletin pathname is
- SCC:DDN-SECURITY-yynn (where "yy" is the year the bulletin is issued
- and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-9001).
- **********************************************************************
-
- Patch Available for SunOS in.telnetd
-
-
- + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
- ! !
- ! The following important advisory was issued by the Computer !
- ! Incident Advisory Capability (CIAC) and is being relayed unedited !
- ! via the Defense Communications Agency's Security Coordination !
- ! Center distribution system as a means of providing DDN !
- ! subscribers with useful security information. !
- ! !
- + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
-
-
-
- NO RESTRICTIONS
- _____________________________________________________
- The Computer Incident Advisory Capability
- ___ __ __ _ ___
- / | / \ /
- \___ __|__ /___\ \___
- _____________________________________________________
- Information Bulletin
-
- March 26, 1991, 1330 PST Number B-20
-
- Patch Available for SunOS in.telnetd
- ________________________________________________________________________
- PROBLEM: SunOS versions 4.0.3 through 4.1.1 in.telnetd exhibits may
- send output to an authorized user.
- PLATFORM: All Sun3 and Sun4 computers running SunOS 4.0.3, 4.1 or
- 4.1.1.
- DAMAGE: May allow unauthorized access to the system.
- SOLUTIONS: Patch/update available from Sun.
- IMPACT OF PATCH: Vulnerability eliminated. No other side-effects
- reported.
- _______________________________________________________________________
- Critical Information about in.telnetd Patch
-
- Sun Microsystems has recently announced the availability of a new patch
- for the utility in.telnetd (the daemon that controls the remote login
- program, telnet). If not patched this utility may allow unauthorized
- access to systems. The patch is available from Sun Microsystems as
- Patch ID# 100125-02 (this number is required to order this patch from
- the Sun Answer Center). This patch is also available via anonymous ftp
- at uunet.uu.net (IP# 192.48.96.2) in the file
- sun-dist/100125-02.tar.Z. If you obtain the patch using anonymous ftp,
- no additional installation instructions are necessary. If you obtain
- the patch in some other manner (e.g., from CIAC), we suggest that you
- use the following installation procedure:
-
- 1. Log in as root on the system to be repaired.
-
- 2. Disable the flawed version of in.telnetd with the following
- commands:
-
- # mv /usr/etc/in.telnetd /usr/etc/in.telnetd.FCS
- # chmod 600 /usr/etc/in.telnetd.FCS
-
- 3. Obtain the patch file 100125-02.tar.Z (either from Sun or a trusted
- anonymous FTP site such as uunet.uu.net).
-
- 4. Uncompress the patch file:
-
- # uncompress 100125-02.tar.Z
-
- 5. Extract the patch file appropriate to your architecture (either
- 3, 3x, 4, or 4c -- contact your Sun representative if you do not know
- which architecture you have)
-
- # tar xf 100125-02.tar {architecture}/in.telnetd
- where {architecture} is one of 3, 3x, 4, or 4c.
-
- 6. Copy the patch file to the appropriate directory, and set the
- ownership and permissions of the utility:
-
- # cp {architecture}/in.telnetd /usr/etc/in.telnetd
- # chown root.staff /usr/etc/in.telnetd
- # chmod 755 /usr/etc/in.telnetd
-
- 7. Kill any existing telnet processes that may be running.
-
- # ps ugax | grep in.telnetd
- # kill -9 ####
- where #### is the number of each in.telnetd process found in
- the previous command. Please note that this command may
- disrupt ongoing sessions of users attempting to use the
- system. As an alternative to this step, you may consider
- rebooting the computer, allowing time for all current users to
- log out.
-
- Once you have verified that the new version of telnet is operational,
- it is advisable to delete the unpatched version of the utility
- (/usr/etc/in.telnetd.FCS) to prevent its unauthorized use.
-
- For additional information or assistance, please contact CIAC:
-
- Tom Longstaff
- (415) 423-4416 or (FTS) 543-4416
-
- Call CIAC at (415) 422-8193 or (FTS) 532-8193 or
- send e-mail to ciac@cheetah.llnl.gov.
-
- Send FAX messages to: (415) 423-0913 or (FTS) 543-0913
-
- Sun Microsystems provided information contained in this bulletin. This
- document was prepared as an account of work sponsored by an agency of
- the United States Government. Neither the United States Government nor
- the University of California nor any of their employees, makes any
- warranty, express or implied, or assumes any legal liability or
- responsibility for the accuracy, completeness, or usefulness of any
- information, apparatus, product, or process disclosed, or represents
- that its use would not infringe privately owned rights. Reference
- herein to any specific commercial products, process, or service by
- trade name, trademark, manufacturer, or otherwise, does not necessarily
- constitute or imply its endorsement, recommendation or favoring by the
- United States Government or the University of California. The views and
- opinions of authors expressed herein do not necessarily state or
- reflect those of the United States Government or the University of
- California, and shall not be used for advertising or product
- endorsement purposes.
- Organization: National Institute of Standards and Technology (NIST)
- Sub-Organization: National Computer Systems Laboratory
-
-
-
-
-