home *** CD-ROM | disk | FTP | other *** search
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- ============================================================================
- CERT(sm) Advisory CA-94:13
- Original issue date: August 11, 1994
- Last revised: August 30, 1996
- Information previously in the README was inserted
- into the advisory.
-
- A complete revision history is at the end of this file.
-
- Topic: SGI IRIX Help Vulnerability
- - -----------------------------------------------------------------------------
-
- The CERT Coordination Center has received information about a vulnerability in
- the Silicon Graphics, Inc. IRIX operating system, versions 5.1.x and 5.2.
- This vulnerability enables users to gain unauthorized root access. To
- exploit the vulnerability, a person must log into an account on the system
- or have physical access to the system console.
-
- SGI has developed a patch for the vulnerability. Because the vulnerability has
- been widely discussed in public forums on the Internet, we recommend that you
- install the patch as soon as possible. Section III below contains
- instructions for obtaining the patch, along with a workaround you can use
- until you install it.
-
- We will update this advisory as we receive additional information.
- Please check advisory files regularly for updates that relate to your site.
-
- - -----------------------------------------------------------------------------
-
- I. Description
-
- A vulnerability exists in the SGI help system and print manager, enabling
- users to get unauthorized root access if they can log into an account on the
- system or get physical access to the system console. The vulnerability is
- present in the SGI IRIX operating system, versions 5.1.x and 5.2. SGI reports
- that the problem will be permanently corrected in a future release of IRIX.
-
- In public discussions, the vulnerability has been referred to by various
- names, including clogin, printer manager, and SGI Help.
-
- II. Impact
-
- Individuals with accounts on the system or physical access to the system
- console can obtain root access.
-
- III. Solutions
-
- A. For IRIX 5.2
-
- If you are running IRIX 5.2, obtain and install patch65 according
- to the instructions provided. These instructions can be found in the
- "relnotes.patchSG0000065" file in the patch65.tar file (see below).
-
- To install this patch successfully, you need to have the latest SGI
- "inst" program installed (this is available as patch00 or patch34).
-
- SGI has provided instructions for determining if the new install
- program is on your system. We have placed these in an appendix
- at the end of this advisory.
-
- These patches are available by anonymous FTP from ftp.sgi.com and
- from sgigate.sgi.com in the "/security" directory.
-
- Filename patch65.tar
- Standard Unix Sum 63059 1220
- System V Sum 15843 2440
- MD5 af8c120f86daab9df74998b31927e397
-
-
- Filename patch34.tar.Z
- Standard Unix Sum 11066 15627
- System V Sum 1674 31253
- MD5 2859d0debff715c5beaccd02b6bebded
-
- Patches are available on CD. Contact your nearest SGI service
- provider for distribution.
-
- B. For IRIX 5.1.x
-
- If you are running versions 5.1.x, SGI recommends that you upgrade to
- version 5.2, if possible, and then follow the instructions in Section
- III.A. above. If you cannot upgrade to 5.2, see the workaround
- instructions in III.C.
-
- C. Workaround
-
- If you cannot install the patches or are delayed in obtaining them,
- SGI recommends removing the help subsystem using the following
- command (as root):
-
- # versions remove sgihelp.sw.eoe
-
- PLEASE NOTE: Removal of this subsystem will affect other
- installed software that use the SGI Help system. After
- the removal, certain help functions from within applications
- will return non-fatal error messages about the missing subsystem.
-
- At a later date, when the patch can be installed on the system,
- you will need to re-install the previously removed SGI Help software
- prior to installing patch65. This can be found on your original
- software distribution (CD labeled as IRIX 5.2). As root, use the
- command:
-
- # inst -f /CDROM/dist/sgihelp
- Inst> install sgihelp.sw.eoe
- Inst> go
-
- The installation documentation provides further information.
-
- .............................................................................
- Appendix
-
- There are three patches related to this issue - patch00, patch34, and patch65.
-
- Patch34 is an update to patch00 which modifies the "inst" program to
- be able to handle patch updates. At least one of patch00 or patch34
- is required to be installed before installing patch65. To determine
- if the new inst program is already installed on your system,
- the following command can be issued:
-
- # versions patch\*
- I = Installed, R = Removed
-
- Name Date Description
-
- I patchSG0000034 08/10/94 Patch SG0000034
- I patchSG0000034.eoe1_sw 08/10/94 IRIX Execution Environment Software
- I patchSG0000034.eoe1_sw.unix 08/10/94 IRIX Execution Environment
-
-
- If patchSG0000000 or patchSG0000034 (as seen above) is loaded,
- then it is only necessary to download patch65 as described in the advisory.
- This is important since patch34 is rather large (16MB).
-
- Otherwise, download both patch34 and patch65. Install patch34 first,
- then patch65. To install patch34, uncompress and untar "patch34.tar.Z"
- and follow the instructions in the "README.FIRST" file.
-
- These patches are available by anonymous FTP from ftp.sgi.com
- in the "security" directory:
-
- Standard System V MD5
- Unix Unix Digital Signature
- patch34.tar.Z: 11066 15627 1674 31253 2859d0debff715c5beaccd02b6bebded
- patch65.tar: 63059 1220 15843 2440 af8c120f86daab9df74998b31927e397
-
-
- - ---------------------------------------------------------------------------
- The CERT Coordination Center wishes to thank Silicon Graphics, Inc., for their
- cooperation in responding to this problem and members of the AUSCERT and CIAC
- response teams for their contributions to this advisory.
- - ---------------------------------------------------------------------------
-
- If you believe that your system has been compromised, contact the CERT
- Coordination Center or your representative in Forum of Incident
- Response and Security Teams (FIRST).
-
- If you wish to send sensitive incident or vulnerability information to
- CERT via electronic mail, CERT strongly advises that the e-mail be
- encrypted. CERT can support a shared DES key, PGP (public key
- available via anonymous FTP on info.cert.org), or PEM (contact CERT
- for details).
-
- Internet E-mail: cert@cert.org
- Telephone: 412-268-7090 (24-hour hotline)
- CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
- and are on call for emergencies during other hours.
-
- CERT Coordination Center
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15213-3890
- USA
-
- Past advisories, information about FIRST representatives, and other
- information related to computer security are available for
- anonymous FTP from info.cert.org.
-
- Copyright 1994, 1996 Carnegie Mellon University
- This material may be reproduced and distributed without permission provided
- it is used for noncommercial purposes and the copyright statement is
- included.
-
- CERT is a service mark of Carnegie Mellon University.
-
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Revision history
-
- Aug. 30, 1996 Information previously in the README was inserted
- into the advisory.
-
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6.2
-
- iQCVAwUBMiSpz3VP+x0t4w7BAQHo6wQAiiaiarjPGRyVfbLFvr+t8rqtqacnGeZy
- 1YeZVcwJliMZAXthgpYWAxx5F56/lW7VL11oSm/crBMv/fWrvbPyl+uR90bKirO2
- Mw1CFaOETxps51l92rPUFYakmiki6P5yhsp00vnxGeOhr6KWQ+ALieeRnSH3yWn0
- Z6jnDQiBErY=
- =CrFP
- -----END PGP SIGNATURE-----
-
-