[220] in bugtraq

home help back first fref pref prev next nref lref last post

[8lgm]-Advisory-15.UNIX.mail3.28-Nov-1994

daemon@ATHENA.MIT.EDU ([8LGM] Security Team)
Mon Nov 28 03:18:12 1994

Date: Mon, 28 Nov 1994 05:28:51 GMT
From: "[8LGM] Security Team" <8lgm@bagpuss.demon.co.uk>
To: 8lgm-advisories@bagpuss.demon.co.uk, Alec.Muffett@sun.co.uk,
        brad.powell@sun.com, bugtraq@fc.net, cert@cert.org,
        Mark.Graff@Corp.Sun.COM, security-alert@sun.com

This advisory has been sent to:

        comp.security.unix

        BUGTRAQ                 <bugtraq@crimelab.com>
        CERT/CC                 <cert@cert.org>
        Sun Microsystems        <security-alert@sun.com>

===========================================================================
             [8lgm]-Advisory-15.UNIX.mail3.28-Nov-1994


PROGRAM:

        SunOS 4.1.x binmail(1)

VULNERABLE OS's:

        SunOS 4.1.x

PATCHID:

	Tested up to SunOS 4.x SMCC Jumbo PATCH, 94/09/13 Patchid 100224-13

DESCRIPTION:

	A hole in binmail(1) allows files to be created as root.
	
IMPACT:

	Any user can become root.

REPEAT BY:

	Exploit details will not be available.

DISCUSSION:

	A flaw in binmail(1) reported to Sun by 8lgm some time ago, has not
	been fixed in the the latest patch.  (The latest patch does
	fix the tmp file and mailbox creation problems successfully).
	Using the src for binmail(1) posted to bugtraq, and the diff
	for the latest patch provided to 8lgm by Sun to verify their fix,
	we have created a secure binmail(1) for SunOS.

	However, as both the diff and source for binmail(1) are covered
	by copyright, we cannot post this fix.

	We are therefore submitting our source to Sun, who we hope can
	then supply a secure binmail(1) in the near future.

WORKAROUND & FIX:

        1. Contact your vendor for a patch.

	2. The current patch for binmail(1) is the most secure fix
	available from Sun, so is recommended for use.  If your system
	is using a port of BSDs mail.local, we recommend continuing the
	use of this.

FEEDBACK AND CONTACT INFORMATION:

        8lgm-bugs@bagpuss.demon.co.uk           (To report security flaws)

        8lgm-request@bagpuss.demon.co.uk        (Mailing list additions -
						 processed automatically;
						 just send any message)

        8lgm@bagpuss.demon.co.uk                (Everything else)

        System Administrators are encouraged to contact us for any
        other information they may require about the problems described
        in this advisory.

        We welcome reports about which platforms this flaw does or does
        not exist on.

        NB: 8lgm-bugs@bagpuss.demon.co.uk is intended to be used by
        people wishing to report which platforms/OS's the bugs in our
        advisories are present on.  Please do *not* send information on
        other bugs to this address - report them to your vendor and/or
        comp.security.unix instead.

8LGM MAILING LIST:

	Send any message to 8lgm-request@bagpuss.demon.co.uk and the
	address you mail from will automatically be added to the list.

	If you need to subscribe to an address you cannot mail from
	(eg an alias), send mail to 8lgm@bagpuss.demon.co.uk and request
	to be added to the list.  Due to our mail volume, we appreciate
	it if you can use 8lgm-request instead; thus if	you need to
	subscribe an alias, please look into using, say sendmail -f,
	if possible.

8LGM FILESERVER:

	All [8LGM] advisories may be obtained via the [8LGM] fileserver.
	For details, 'echo help | mail 8lgm-fileserver@bagpuss.demon.co.uk'
===========================================================================


home help back first fref pref prev next nref lref last post