home *** CD-ROM | disk | FTP | other *** search
- Date: Mon, 15 Feb 1999 10:59:40 -0500 (EST)
- From: X-Force <xforce@iss.net>
- To: alert@iss.net
- Cc: X-Force <xforce@iss.net>
- Subject: ISSalert: ISS Security Advisory: Buffer Overflow in "Super" package in Debian Linux
-
- TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to
- majordomo@iss.net Contact alert-owner@iss.net for help with any problems!
- ---------------------------------------------------------------------------
-
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- ISS Security Advisory
- February 15, 1999
-
- Buffer Overflow in "Super" package in Debian Linux
-
-
- Synopsis:
-
- Internet Security Systems (ISS) X-Force has discovered a vulnerability in
- the system administration utility, "Super". Super is used by
- administrators to allow certain users to execute commands with root
- privileges. The vulnerability is distributed with Debian Linux. It may
- allow local attackers to compromise root access. Super is a GNU
- copylefted package that is distributed with recent Debian Linux
- distributions, but it can be installed and configured for many Unix
- variants.
-
-
- Affected versions:
-
- ISS X-Force has determined that version 3.9.6 through version 3.11.6 are
- vulnerable. All versions of Super distributed with Debian Linux are
- vulnerable. Execute the following command to determine version
- information:
-
- # /usr/bin/super -V
-
-
- Fix Information:
-
- Super 3.11.7 is available at:
- ftp.ucolick.org:/pub/users/will/super-3.11.7.tar.gz
-
- The new version of Super will be available soon on the mirror:
- ftp.onshore.com:/pub/mirror/software/super
-
- Please refer to these locations for fixes which are included in
- Super version 3.11.7.
-
- Description:
-
- Super is a utility that allows authorized users to execute commands with
- root privileges. It is intended to be an alternate to setuid scripts,
- which are inherently dangerous. A buffer overflow exists in Super that
- may allow attackers to take advantage of its setuid configuration to gain
- root access.
-
-
- Recommended Action:
-
- Version 3.11.7 should be installed immediately. Administrators should
- take care to disable setuid root utilities that are not used by regular
- users. To disable Super permanently, execute the following command
- as root to disable the setuid bit:
-
- # chmod 755 /usr/bin/super
-
- __________
-
- Copyright (c) 1999 by Internet Security Systems, Inc.
-
- Permission is hereby granted for the redistribution of this alert
- electronically. It is not to be edited in any way without express
- consent of X-Force. If you wish to reprint the whole or any part of this
- alert in any other medium excluding electronic medium, please e-mail
- xforce@iss.net for permission.
-
- Disclaimer:
-
- The information within this paper may change without notice. Use of this
- information constitutes acceptance for use in an AS IS condition. There
- are NO warranties with regard to this information. In no event shall the
- author be liable for any damages whatsoever arising out of or in
- connection with the use or spread of this information. Any use of this
- information is at the user's own risk.
-
- X-Force PGP Key available at: http://www.iss.net/xforce/sensitive.html,
- as well as on MIT's PGP key server and PGP.com's key server.
-
- X-Force Vulnerability and Threat Database: http://www.iss.net/xforce
-
- Please send suggestions, updates, and comments to: X-Force
- <xforce@iss.net> of Internet Security Systems, Inc.
-
- -----BEGIN PGP SIGNATURE-----
- Version: 2.6.3a
- Charset: noconv
-
- iQCVAwUBNshBDjRfJiV99eG9AQEswgP/a76fI4GVtLraVVuBAWNG6bY2moihbs54
- 62kT4Zf+oLzgMl4HbpFjFAzXjhL0fQdMzs26LTk1W8MC0idvRj9p65JMajkalUL+
- 78OcrkWqHIWH6mQ9ijnGJVW9x1LCEAXOD3EYl+PSTnR02WR2z0DNj30bdEUjp2LN
- DfSFhqndj5o=
- =xVb7
- -----END PGP SIGNATURE-----
-
-