[6] in Security FYI

home help back first fref pref prev next nref lref last post

new security hole found in pop-2 service

daemon@ATHENA.MIT.EDU (mhpower@MIT.EDU)
Thu May 27 16:29:52 1999

From: <mhpower@MIT.EDU>
Date: Thu, 27 May 1999 16:29:40 -0400
Message-Id: <199905272029.QAA08810@the-oz.mit.edu>
To: security-fyi@MIT.EDU
Reply-To: net-security@MIT.EDU

There has been a recent announcement of a security problem in the
Unix pop-2 (Post Office Protocol, version 2) service -- the problem
can allow intruders to break in to your computer remotely. The pop-2
service is seldom accessed at MIT (most everyone uses pop-3 instead)
but the insecure service is still enabled on many MIT computers,
especially ones running Linux.

It is likely that intruders will start trying to break in via this
security hole by this weekend, or earlier.

Please check your Linux or other Unix systems for the existence of a
pop-2 service, and shut off the service if it exists. In general, the
steps would be

  -- login to the system as root
  -- look for any line in the /etc/inetd.conf file that begins with
     either pop-2 or pop2
  -- if there is no such line, the system does not have this security
     problem; you are done
  -- insert a # character at the beginning of the line that starts
     with pop-2 or pop2 (this comments out the line)
  -- save the modified /etc/inetd.conf file
  -- have your inetd process reload this configuration file inetd.conf.
     In general, you need to find the pid number of your inetd process
     and then type in "kill -HUP" followed by the pid number, e.g.,

        kill -HUP 12345

     On most Linux systems, the pid number is found in the file
     /var/run/inetd.pid

For more information about reconfiguring your computers to eliminate
this new security problem, see

  http://web.mit.edu/net-security/www/fyi/fyi-1999-001-pop2.html

Matt Power
Network Security team, MIT Information Systems

home help back first fref pref prev next nref lref last post