[450] in Best-of-Security

home help back first fref pref prev next nref lref last post

BoS: ISS Security Alert Summary v1 n6

daemon@ATHENA.MIT.EDU (X-Force)
Wed Nov 12 22:26:23 1997

Old-X-Envelope-From: xforce@arden.iss.net  Fri Nov  7 13:49:35 1997
Date: Thu, 6 Nov 1997 16:24:28 -0500 (EST)
From: X-Force <xforce@iss.net>
cc: X-Force <xforce@arden.iss.net>
Old-X-Originally-To: To: best-of-security@cyber.com.au
Old-X-Originated-From: From: X-Force <xforce@iss.net>
Errors-To: best-of-security-request@cyber.com.au
To: best-of-security@cyber.com.au
Resent-From: best-of-security@cyber.com.au


-----BEGIN PGP SIGNED MESSAGE-----

ISS Security Alert Summary
November 5, 1997
Volume 1 Number 6


X-Force Vulnerability and Threat Database: http://www.iss.net/xforce

To receive these Alert Summaries, subscribe to the ISS Alert mailing list
by sending an email to majordomo@iss.net and within the body of the
message type:  'subscribe alert'.

___

Index

12 Reported New Vulnerabilities
 - HP-cde
 - FreeBSD-open
 - IBM-portmir
 - IBM-piodmgrsu
 - IBM-nslookup
 - IBM-ftp
 - Sun-niscache
 - Sun-ftpd/rlogind
 - Sun-sysdef
 - IBM-libDtSvc
 - bsd-tel-tgetent
 - linux-lpd

1 Vulnerability Update
 - Sun-rlogin

Comparative Network Security Scanner Review

Risk Factor Key

___

Date Reported:		10/29/97
Vulnerability:		HP-cde
Affected Platforms:	HP-UX (10.10, 10.20, 10.30)
Risk Factor:		High

Hewlett Packard's Common Desktop Environment is a windowing system that
contains session and window management tools, network services, and other
common desktop tools.  Several setuid and setgid programs have buffer
overflow conditions that can be exploited to gain unauthorized privileges.
HP has release patches that correct these problems.

References:
HP Security Bulletin #00072 - http://us-support.external.hp.com/
http://ciac.llnl.gov/ciac/bulletins/i-009.shtml

___

Date Reported:		10/29/97
Vulnerability:		FreeBSD-open
Affected Platforms:	FreeBSD (2.1.x, 2.2.x)
			FreeBSD-stable
			FreeBSD-current
Risk Factor:		High

A problem exists in in the way that FreeBSD's open() system call obtains
the right to execute io instructions.  This would allow any local user to
exploit this problem to execute unauthorized io instructions.  The problem
in open() has been corrected in FreeBSD-current 1997/10/24.

Reference:
ftp://freebsd.org/pub/CERT/advisories/FreeBSD-SA-97%3A05.open.asc

___

Date Reported:		10/29/97
Vulnerability:		IBM-portmir
Affected Platforms:	AIX (4.2.1)
Risk Factor:		High

Multiple vulnerabilities in AIX's portmir command exist that allow local
users to obtain unauthorized root privileges.

Reference:
http://www.ers.ibm.com/tech-info/advisories/sva/1997/ERS-SVA-E01-1997:006.1.txt
http://ciac.llnl.gov/ciac/bulletins/i-011.shtml

___

Date Reported:          10/29/97
Vulnerability:          IBM-piodmgrsu
Affected Platforms:	AIX (4.1, 4.2)
Risk Factor:		Medium

Piodmgrsu is a program that performs various operations on the printer
backend's alternate ODM database.  It contains a vulnerability in the way
that is passes environment variables to child processes that allows local
users to obtain access to the printq group.

Reference:
http://www.ers.ibm.com/tech-info/advisories/sva/1997/ERS-SVA-E01-1997:007.1.txt
http://ciac.llnl.gov/ciac/bulletins/i-010.shtml

___

Date Reported:          10/29/97
Vulnerability:          IBM-nslookup
Affected Platforms:	AIX (4.1, 4.2)
Risk Factor:		High

Nslookup is a program that is used to query Internet domain name servers
and return various information about hosts.  It contains a vulnerability
that allows local users to obtain unauthorized root access.

Reference:
http://www.ers.ibm.com/tech-info/advisories/sva/1997/ERS-SVA-E01-1997:008.1.txt
http://ciac.llnl.gov/ciac/bulletins/i-010.shtml

___

Date Reported:          10/29/97
Vulnerability:          IBM-ftp
Affected Platforms:	AIX (3.2, 4.1, 4.2)
Risk Factor:		High

The File Transfer Protocol (ftp) client contains a vulnerability in that
it can be tricked into executing arbitrary commands.  Remote servers can
name a file preceded by the | symbol, and the local ftp client will
execute that file as a shell script on the local machine.  It is possible
that root access could be acquired using this trick.
   
Reference:
http://www.ers.ibm.com/tech-info/advisories/sva/1997/ERS-SVA-E01-1997:009.1.txt

___

Date Reported:		10/28/97
Vulnerability:		Sun-niscache
Affected Platforms:	Solaris (2.4, 2.5, 2.5.1)
Risk Factor:		High

The program nis_cachemgr is used by NIS+ to cache location information of
NIS+ servers.  This would allow an attacker to potentially add directory
objects to the shared cache and specify rogue NIS+ servers that they
control.

References:
http://sunsolve.sun.com/sunsolve/secbulletins/security-alert-155.txt
http://ciac.llnl.gov/ciac/bulletins/i-007.shtml

___
   
Date Reported:          10/28/97
Vulnerability:          Sun-ftpd/rlogind
Affected Platforms:	Solaris (2.3, 2.4, 2.5, 2.5.1)
			SunOS (4.1.3, 4.1.4)
Risk Factor:		High

A vulnerability exists in the Internet File Transfer Protocol server
process (in.ftpd) and the rlogin server process (in.rlogind).  The
attacker can execute arbitrary commands on the host by connecting from the
ftp server's data port to the rlogin server on a trusted host.

References:
http://sunsolve.sun.com/sunsolve/secbulletins/security-alert-156.txt
http://ciac.llnl.gov/ciac/bulletins/i-007.shtml

___
   
Date Reported:          10/28/97
Vulnerability:          Sun-sysdef
Affected Platforms:	Solaris (2.3, 2.4, 2.5, 2.5.1)
Risk Factor:		High
   
The command, sysdef, is used to display current system information such as
hardware devices, system devices, kernel parameters, etc.  It contains a
vulnerability that would allow local users to read kernel memory.  Kernel
memory can contain such information as unencrypted passwords, and could
possibly lead to root access.

References:
http://sunsolve.sun.com/sunsolve/secbulletins/security-alert-157.txt
http://ciac.llnl.gov/ciac/bulletins/i-007.shtml

___

Date Reported:		10/28/97
Vulnerability:		IBM-libDtSvc
Affected Platforms:	AIX (4.1, 4.2)
Risk Factor:		High

AIX has a buffer overflow in the libDtSrv.a library that allows
unauthorized local users to obtain root privileges.  An exploit for this
vulnerability was posted on a security mailing list and is publicly
available.

Reference:
http://www.ers.ibm.com/tech-info/advisories/sva/1997/ERS-SVA-E01-1997:005.1.txt
http://ciac.llnl.gov/ciac/bulletins/i-010.shtml

___

Date Reported:		10/21/97
Vulnerability:		bsd-tel-tgetent
Affected Platforms:	BSD/OS (2.1)
Risk Factor:		High

The telnet daemon, telnetd, contains a vulnerability in its tgetent 
library routine.  By manipulating environment variables which are passed
to the telnet daemon, an attacker can produce a buffer overflow to obtain
root privileges.

Reference:
ftp://ftp.secnet.com/pub/advisories/SNI-20.telnetd.tgetent.advisory

___

Date Reported:		10/6/97
Vulnerability:		linux-lpd
Affected Platforms:	Linux (Redhat 4.2)
Risk Factor:		High

The first problem is that Redhat calls the printfilter software package
when any file is being printed.  After determining the file type,
printfilter applies the appropriate filter to the file so that it can be
printed properly.  Some filters use the /tmp directory to write in,
therefore local users can create system links that will overwrite files
with uid bin and gid root.  The second problem concerns groff requests
that allows local as well as remote users execute programs as uid bin and
gid root, which can easily lead to root access.

Reference:
http://www.dec.net/ksrt/adv4.html

___

Date:			10/28/97
Update:			Sun-rlogin
Vendor:			Sun Microsystems, Inc.
Platforms:		Solaris (2.3, 2.4, 2.5, 2.5.1)
			SunOS (4.1.3, 4.1.4)

Sun has released patches for the rlogin vulnerability in which the TERM
environment variable is copied to an internal buffer.  The buffer can be
overflowed and arbitrary code can be executed.  Since rlogin is setuid 
root, local accounts would be able obtain unauthorized root access.

References:
http://sunsolve.sun.com/sunsolve/secbulletins/security-alert-158.txt
http://ciac.llnl.gov/ciac/bulletins/h-25a.shtml
ftp://info.cert.org/pub/cert_advisories/CA-97.06.rlogin-term

___

For a comparative review of five network security scanners, see
Network World Magazine.  http://www.nwfusion.com and register for a login.
Review: http://www.nwfusion.com/reviews/1027rev.html

___

Risk Factor Key:

	High  	any vulnerability that provides an attacker with immediate
		access into a machine, gains superuser access, or bypasses
		a firewall.  Example:  A vulnerable Sendmail 8.6.5 version
		that allows an intruder to execute commands on mail
		server.
	Medium	any vulnerability that provides information that has a
		high potential of giving access to an intruder.  Example: 
		A misconfigured TFTP or vulnerable NIS server that allows
		an intruder to get the password file that possibly can
		contain an account with a guessable password.
	Low	any vulnerability that provides information that
		potentially could lead to a compromise.  Example:  A
		finger that allows an intruder to find out who is online
		and potential accounts to attempt to crack passwords
		via bruteforce.

Internet Security Systems, Inc., (ISS) is the pioneer and world's leading
supplier of network security assessment and intrusion detection tools,
providing comprehensive software that enables organizations to proactively
manage and minimize their network security risks.  For more information,
contact the company at (800) 776-2362 or (770) 395-0150 or visit the ISS
Web site at http://www.iss.net.

________

Copyright (c) 1997 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert Summary
electronically.  It is not to be edited in any way without express consent
of X-Force.  If you wish to reprint the whole or any part of this 
Alert Summary in any other medium excluding electronic medium, please
email xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this 
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in connection 
with the use or spread of this information. Any use of this information is
at the user's own risk.

X-Force PGP Key available at:   http://www.iss.net/xforce/sensitive.html
as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to:
X Force <xforce@iss.net> of Internet Security Systems, Inc.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNGI0dDRfJiV99eG9AQFh8QQAt2TguJezbENZNcWo/OrcScv6ivCArXX9
Ch+90D5YdX3e3465NcUNeKqRa6+oI6SdTVN4MWqzMEYpCSx3axan6i1VXeeIrIHB
YZAKKxrpeDQRIFfoi8t8iPoxSfU/m3HKDux2o8iWGvQSlpxfuNn3rg2HKaZPB1WJ
Xy74XimMs3E=
=2oAC
-----END PGP SIGNATURE-----




home help back first fref pref prev next nref lref last post