home *** CD-ROM | disk | FTP | other *** search
- ***********************************************************************
- DDN Security Bulletin 9113 DCA DDN Defense Communications System
- 23 August 91 Published by: DDN Security Coordination Center
- (SCC@NIC.DDN.MIL) (800) 235-3155
-
- DEFENSE DATA NETWORK
- SECURITY BULLETIN
-
- The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
- Coordination Center) under DCA contract as a means of communicating
- information on network and host security exposures, fixes, & concerns
- to security & management personnel at DDN facilities. Back issues may
- be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.67.67.20]
- using login="anonymous" and password="guest". The bulletin pathname is
- SCC:DDN-SECURITY-yynn (where "yy" is the year the bulletin is issued
- and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-9001).
- ***********************************************************************
-
- DEC ULTRIX /usr/bin/mail Vulnerability
-
- + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
- ! !
- ! The following important advisory was issued by the Computer !
- ! Emergency Response Team (CERT) and is being relayed unedited !
- ! via the Defense Communications Agency's Security Coordination !
- ! Center distribution system as a means of providing DDN !
- ! subscribers with useful security information. !
- ! !
- + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
-
- CA-91:13 CERT Advisory
- August 23, 1991
- DEC ULTRIX /usr/bin/mail Vulnerability
- -------------------------------------------------------------------------------
-
- The Computer Emergency Response Team/Coordination Center (CERT/CC) has
- received information concerning a vulnerability in all versions of Digital
- Equipment Corporation's (DEC) ULTRIX operating system prior to 4.2 and
- applicable to all Digital Equipment Corporation architectures.
- The vulnerability has been fixed in ULTRIX version 4.2.
-
- This vulnerability allows any user logged into the system to obtain a root
- shell.
-
- Appended is an update to a Digital Equipment Corporation DSNlink/ DSIN FLASH
- which describes the vulnerability and Digital Equipment Corporation's
- recommended solution.
-
- If you have any inquiries regarding Digital Equipment Corporation's document,
- please contact your Digital Services Support Organization.
-
- ===============================================================================
- Start of Digital Equipment Corporation's Document.
-
- -------------------------------------------------------------------------------
- SOURCE: Digital Equipment Corporation.
-
- COPYRIGHT (c) 1988, 1989, 1990 by Digital Equipment Corporation.
- ALL RIGHTS RESERVED.
-
-
- INFORMATION:
-
- ULTRIX V4.1 - Security Vulnerability Identified in /usr/bin/mail
-
-
- PROBLEM:
-
- A potential security vulnerability has been identified in ULTRIX
- Version 4.1 where, under certain circumstances, user privileges
- can be expanded via /usr/bin/mail. This problem applies to both
- the VAX and DEC RISC (i.e. DECsystem and DECstation ) architectures.
-
- As always, Digital urges you to regularly review your system
- management and security procedures. Digital will continue to review
- and enhance security features, and work with our customers to further
- improve the integrity of their systems.
-
-
- SOLUTION:
-
- Digital has corrected the identified code as of ULTRIX Version 4.2
- (released May 1991). Digital recommends strongly that you upgrade to
- ULTRIX Version 4.2 immediately to avoid any potential vulnerability
- to your system via this problem. For those of you who are unable to
- upgrade at this time, installing the ULTRIX Version 4.2 mail file on
- your V4.1 system will correct this problem.
-
- ULTRIX Version 4.2 of /usr/bin/mail has not been shown to be
- compatible with versions of ULTRIX previous to ULTRIX version 4.1;
- upgrading to ULTRIX V4.2 or upgrading to ULTRIX V4.1 and using the
- ULTRIX 4.2 /usr/bin/mail program is required to correct this
- problem.
-
- Use one of the procedures below to update an ULTRIX Version 4.1 system:
-
- - Procedure (1) describes the process to extract the
- /usr/bin/mail binary from the ULTRIX Version 4.2 MUP subset.
-
- - Procedure (2) provides the commands to install the
- ULTRIX Version 4.2 /usr/bin/mail binary from another of your
- system(s) where possible.
-
- - Both the VAX (DECsystem) and DEC RISC (DECstation)
- versions of the ULTRIX Version 4.2 /usr/bin/mail binary,
- may be obtained by contacting your Digital Services Support
- Organization.
-
-
- -------------------------------------------------------------------------------
-
- (1) This procedure will replace your existing /usr/bin/mail binary using
- the /usr/bin/mail binary from the ULTRIX Version 4.2 MUP distribution.
- The procedure below describes the method to extract the binary from
- the tape media.
-
- NOTE:
-
- Setting the environment to single user mode will prevent possible
- disruption of the mail services.
- -------------------------------------------------------------------------------
-
- To update an ULTRIX Version 4.1 system, you must first obtain the
- ULTRIX Version 4.2 binary of /usr/bin/mail for your computer's
- architecture from your ULTRIX Version 4.2 distribution tapes.
-
- LOAD THE ULTRIX MANDATORY UPGRADE TAPE ON YOUR ULTRIX Version 4.1 SYSTEM.
-
- ( Note: UDTBASE421 will provide the RISC base upgrade, ULTBASE421 will)
- ( provide the VAX base upgrade mail file. Substitute as necessary for)
- ( your architecture. )
-
- ( ISSUE THE FOLLOWING COMMANDS FROM YOUR ULTRIX Version 4.1 SYSTEM )
-
- ( BECOME ROOT - YOU MUST HAVE PRIVILEGES TO MAKE THIS UPDATE. )
-
- % su
-
- (cd TO SOME DIRECTORY THAT YOU CAN PUT THE FILE IN TEMPORARILY, e.g. cd /tmp)
-
- # cd /tmp
-
- (NOTE: YOU WILL NEED APPROXIMATELY 2 MB of DISK SPACE )
-
- # mkdir ./usr
- # mkdir ./usr/etc
- # mkdir ./usr/etc/subsets
- # setld -x /dev/nrmt0h {UDTBASE421 or ULTBASE421}
-
-
- ( LIST THE SUBSET, CREATE THE FILE UDTBASE421 or ULTBASE0421, THEN EXTRACT )
- ( THE MAIL FILE /usr/bin/mail {NOTE} THIS EXAMPLE USES THE "RISC" SUBSET )
-
-
- # ls
- # mv UDTBASE421 UDTBASE421.Z
- # zcat UDTBASE421.Z | tar xvf - ./usr/bin/mail
-
- ( MOVE THE ULTRIX V4.2 BINARY TO /usr/bin/mail CHANGE PROTECTION, OWNER etc.)
-
- # cd /usr/bin
- # mv mail mail.old
- # chmod 600 mail.old
- # mv /tmp/usr/bin/mail .
- # chown root mail
- # chgrp kmem mail
- # chmod 6755 mail
-
- -------------------------------------------------------------------------------
- (2) To update the /usr/bin/mail binary from an existing V4.2
- (similar platform (VAX or RISC)) remote node, copy the
- file to your system and store it in a temporary location
- (e.g., - /tmp/mail).
- The procedure below provides an example using DECnet. Use the
- copy command that fits your environment to copy the /usr/bin/mail
- binary from a remote node to the /tmp directory on your local
- system.
-
- NOTE:
-
- Setting the environment to single user mode will prevent possible
- disruption of the mail services.
- -------------------------------------------------------------------------------
-
- % dcp -iv {remote-nodename}/{username}/{password}::'/usr/bin/mail' '/tmp/mail'
-
- ( ISSUE THE FOLLOWING COMMANDS FROM YOUR ULTRIX Version 4.1 SYSTEM )
-
- ( BECOME ROOT - YOU MUST HAVE PRIVILEGES TO MAKE THIS UPDATE. )
-
- % su
- # cd /usr/bin
- # mv mail mail.old
- # chmod 600 mail.old
-
- ( MOVE THE ULTRIX V4.2 BINARY TO /usr/bin/mail CHANGE PROTECTION, OWNER etc.)
-
- # mv /tmp/mail /usr/bin/mail
- # chown root mail
- # chgrp kmem mail
- # chmod 6755 mail
-
- -------------------------------------------------------------------------------
- End of Digital Equipment Corporation Document.
- ===============================================================================
-
- -------------------------------------------------------------------------------
- The CERT/CC would like to thank Tsutomu Shimomura for his assistance and
- Digital Equipment Corporation for their response to this vulnerability.
- -------------------------------------------------------------------------------
-
- If you believe that your system has been compromised, contact CERT/CC via
- telephone or e-mail.
-
- Computer Emergency Response Team/Coordination Center (CERT/CC)
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15213-3890
-
- Internet E-mail: cert@cert.sei.cmu.edu
- Telephone: 412-268-7090 24-hour hotline:
- CERT/CC personnel answer 7:30a.m.-6:00p.m. EST,
- on call for emergencies during other hours.
-
- Past advisories and other computer security related information are
- available for anonymous ftp from the cert.sei.cmu.edu (192.88.209.5)
- system.
-
-