home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1993
/
Internet Info CD-ROM (Walnut Creek) (1993).iso
/
inet
/
scc
/
ddn-security-9101
< prev
next >
Wrap
Text File
|
1991-07-10
|
6KB
|
172 lines
***********************************************************************
DDN Security Bulletin 9101 DCA DDN Defense Communications System
21 Feb 91 Published by: DDN Security Coordination Center
(SCC@NIC.DDN.MIL) (800) 235-3155
DEFENSE DATA NETWORK
SECURITY BULLETIN
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
Coordination Center) under DCA contract as a means of communicating
information on network and host security exposures, fixes, & concerns
to security & management personnel at DDN facilities. Back issues may
be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.67.67.20]
using login="anonymous" and password="guest". The bulletin pathname is
SCC:DDN-SECURITY-yynn (where "yy" is the year the bulletin is issued
and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-9001).
**********************************************************************
SunOS /bin/mail Vulnerability
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
! !
! The following important advisory was issued by the Computer !
! Emergency Response Team (CERT) and is being relayed unedited !
! via the Defense Communications Agency's Security Coordination !
! Center distribution system as a means of providing DDN !
! subscribers with useful security information. !
! !
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
CA-91:01 CERT Advisory
February 21, 1991
SunOS /bin/mail Vulnerability
-------------------------------------------------------------------------
The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received the following information from Sun Microsystems. Sun Microsystems
has given the CERT/CC permission to distribute their Security Bulletin.
It contains information regarding a fix for a vulnerability in SunOS 4.0.3,
SunOS 4.1 and SunOS 4.1.1.
For more information, please contact Sun Microsystems at 1-800-USA-4SUN.
-------------------------------------------------------------------------
SUN MICROSYSTEMS SECURITY BULLETIN:
#00105
This information is only to be used for the purpose of alerting
customers to problems. Any other use or re-broadcast of this
information without the express written consent of Sun Microsystems
shall be prohibited.
Sun expressly disclaims all liability for any misuse of this information
by any third party.
============================================================================
All of these patches are available through your local Sun answer centers
worldwide. As well as through anonymous ftp to ftp.uu.net in the
~ftp/sun-dist directory.
Please refer to the Sun BugID and PatchID when requesting patches from Sun
answer centers.
NO README information will be posted in the patch on UUNET. Please refer
the the information below for patch installation instructions.
============================================================================
Sun Bug ID : 1047340
Synopsis : /bin/mail can be caused to invoke a root shell if given the
(im)proper arguments.
Sun Patch ID: 100224-01
Checksum of compressed tarfile 100224-01.tar.Z = 64102 109
============================================================================
Patch-ID# 100224-01
Keywords: mail, delivery, /bin/mail, 4.1, sendmail
Synopsis: SunOS 4.1.1, 4.1, 4.0.3: program "mail" problem in delivering
mail + security enhancement
Date: 15 Jan 1990
SunOS release: 4.0.3 4.1 4.1.1
Topic: /bin/mail delivering fix
BugId's fixed with this patch: 1045636 1047340
Architectures for which this patch is available: sun3, sun3x, sun4, sun4c,
sun4/490_4.1_PSR_A.
Patches which may conflict with this patch: 100161-01. This patch obsoletes
patch 100161-01 since this patch
incorporates 100161-01 fixes plus
the new fixes.
Obsoleted by: SysV Release 4
Problem Description:
Bug ID: 1045636
/bin/mail is the local delivery agent for sendmail. In
some particular instance, /bin/mail parse its argument incorrectly
and therefore, mail are being drop into the bit bucket...
If you have users that has "f" has the second character, you might want
to try the following: (substitute "af" with anyuser with "f" as second
character)
From any machine except mailhost:
/bin/lib/sendmail -t -v <<END
From: anyuser
to: anyuser
Subject: test
Cc: af <-- substitute any username with second character as "f"
test
END
When the mail arrived on mailhost, sendmail process will invoke
/bin/mail with the following argument "/bin/mail -r anyuser -d af
anyuser". Now you are in trouble. The following are different
scenarios for /bin/mail.
1) /bin/mail -r anyuser -d af <mailmessages worked fine
2) /bin/mail -r anyuser -d anyone af ... <mailmessages worked fine
3) /bin/mail -r anyuser -d af anyone ... <mailmessages !!error!!
in case (3), /bin/mail thinks that you want to read mail instead of
delivering mail. Therefore, mail messages is lost.
BugID: 1047340
/bin/mail can be caused to invoke a root shell if given the
(im)proper arguments.
INSTALL:
AS ROOT:
# mv /bin/mail to /bin/mail.old
# cp $arch/$os/mail to /bin/mail
(where $arch is either sun3 sun4 sun4c or sun3x)
(and where $os is either 4.0.3 4.1 or 4.1.1)
( change the permissions for the newly installed mail)
# chmod 4755 /bin/mail
-------------------------------------------------------------------------
Computer Emergency Response Team/Coordination Center (CERT/CC)
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
Internet E-mail: cert@cert.sei.cmu.edu
Telephone: 412-268-7090 24-hour hotline:
CERT personnel answer 7:30a.m.-6:00p.m. EST.
On call for emergencies during other hours.
Past advisories and other computer security related information are available
for anonymous ftp from the cert.sei.cmu.edu (128.237.253.5) system.
Organization: National Institute of Standards and Technology (NIST)
Sub-Organization: National Computer Systems Laboratory