home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1994 March
/
Internet Info CD-ROM (Walnut Creek) (March 1994).iso
/
inet
/
scc
/
ddn-security-9216
< prev
next >
Wrap
Text File
|
1992-05-28
|
6KB
|
122 lines
**************************************************************************
Security Bulletin 9216 DISA Defense Communications System
May 28, 1992 Published by: DDN Security Coordination Center
(SCC@NIC.DDN.MIL) 1-(800) 365-3642
DEFENSE DATA NETWORK
SECURITY BULLETIN
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
Coordination Center) under DISA contract as a means of communicating
information on network and host security exposures, fixes, and concerns
to security and management personnel at DDN facilities. Back issues may
be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.112.36.5]
using login="anonymous" and password="guest". The bulletin pathname is
scc/ddn-security-yynn (where "yy" is the year the bulletin is issued
and "nn" is a bulletin number, e.g. scc/ddn-security-9216).
**************************************************************************
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
! !
! The following important advisory was issued by the Computer !
! Emergency Response Team (CERT) and is being relayed unedited !
! via the Defense Information Systems Agency's Security !
! Coordination Center distribution system as a means of !
! providing DDN subscribers with useful security information. !
! !
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
===========================================================================
CA-92:12 CERT Advisory
May 28, 1992
Revised Patch for SunOS /usr/etc/rpc.mountd Vulnerability
---------------------------------------------------------------------------
*** THIS IS A REVISED CERT ADVISORY ***
*** IT CONTAINS NEW VULNERABILITY AND PATCH INFORMATION ***
*** SUPERSEDES CERT ADVISORY CA-91:09 ***
The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received information concerning the availability of a revised security
patch for /usr/etc/rpc.mountd in Sun Microsystems Computer Corporation
operating systems. This patch fixes an additional vulnerability that
was not addressed in CERT advisory CA-91:09.SunOS.rpc.mountd.vulnerability.
Sun has provided patches for SunOS 4.1, SunOS 4.1_PSR_A, SunOS 4.1.1,
and SunOS 4.1.2. These patches are available through your local Sun
Answer Center as well as through anonymous ftp from ftp.uu.net (137.39.1.9)
in the /systems/sun/sun-dist directory.
Patch ID and file information are as follows:
Fix Patch ID Filename Checksum
/usr/etc/rpc.mountd 100296-02 100296-02.tar.Z 30606 23
Please note that Sun Microsystems sometimes updates patch files. If you
find that the checksum is different, please contact Sun Microsystems or
the CERT/CC for verification.
---------------------------------------------------------------------------
I. Description
Under certain conditions an exported NFS filesystem can be
mounted by any system on the Internet even though it may appear
that access to the filesystem is restricted to specific hosts.
II. Impact
Unauthorized remote hosts will be able to mount the exported filesystem.
III. Solution
As root:
1. Move the existing rpc.mountd aside and change the permissions.
# mv /usr/etc/rpc.mountd /usr/etc/rpc.mountd.OLD
# chmod 400 /usr/etc/rpc.mountd.OLD
2. Install the new version
# cp `arch`/rpc.mountd /usr/etc
# chown root.staff /usr/etc/rpc.mountd
# chmod 755 /usr/etc/rpc.mountd
3. Kill the currently running rpc.mountd and restart it, or
reboot the system. In either case, systems with filesystems
mounted from this host will have interruptions in service.
---------------------------------------------------------------------------
If you believe that your system has been compromised, contact CERT/CC or
your representative in FIRST (Forum of Incident Response and Security Teams).
Internet E-mail: cert@cert.org
Telephone: 412-268-7090 (24-hour hotline)
CERT/CC personnel answer 7:30 a.m.-6:00 p.m. EST(GMT-5)/EDT(GMT-4),
on call for emergencies during other hours.
Computer Emergency Response Team/Coordination Center (CERT/CC)
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
Past advisories, information about FIRST representatives, and other
information related to computer security are available for anonymous ftp
from cert.org (192.88.209.5).
****************************************************************************
* *
* The point of contact for MILNET security-related incidents is the *
* Security Coordination Center (SCC). *
* *
* E-mail address: SCC@NIC.DDN.MIL *
* *
* Telephone: 1-(800)-365-3642 *
* *
* NIC Help Desk personnel are available from 7:00 a.m.-7:00 p.m. EST, *
* Monday through Friday except on federal holidays. *
* *
****************************************************************************