[10814] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-99.05 - statd-automountd

daemon@ATHENA.MIT.EDU (Scott Cromar)
Sat Jun 12 17:20:49 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.GSO.4.03.9906111732210.25130-100000@timpanogos.princeton.edu>
Date: 	Fri, 11 Jun 1999 17:37:10 -0400
Reply-To: Scott Cromar <cromar@PRINCETON.EDU>
From: Scott Cromar <cromar@PRINCETON.EDU>
X-To:         Mark Zielinski <markz@SECURITY.INFICAD.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.4.05.9906100852060.32313-100000@security.inficad.com>

Re: the SunOS 4.1.4 dimension of this problem:

Sun tells me that patch 102516-06 and later protect against this issue.
(This response was in reaction to Sun Service Order 3993470.)  I am not in
a position to check the validity of their response.

--Scott

On Thu, 10 Jun 1999, Mark Zielinski wrote:

> This CERT Advisory has failed to mention a few things that I would like to
> point out.
>
> CERT Advisory CA-99.05 reports SunOS 5.6 automountd as not being susceptible
> to the rpc.statd bounce attack.  This is incorrect.  SunOS 5.6 is indeed
> vulnerable, it is just harder to exploit because it involves DNS spoofing.
>
> Solaris 7 is not vulnerable because the RPC services are no longer run as
> root and automountd will only accept connections from a uid of zero.  This
> has nothing to due with Sun incorporating a patch into version 7.
>
> System Administrators should also consider the following.  A system
> running SunOS 5.5.1 with a patched automountd (that has not patched rpc.statd)
> is STILL vulnerable.  This is because the automountd patch for SunOS 5.5.1
> only stops non-root local users from specifying the command to be run for
> mounting filesystems.  Any system running rpc.statd in this situation as
> root (which is default) can still be exploited remotely.
>
> System administrators should also take note that simply disabling rpcbind
> will not stop this problem from being exploited.
>
> Both SUN Microsystems and CERT fail to mention that earlier versions of
> SunOS are also affected.  I understand that most systems these days are
> not running these versions, however patches and advisories should still be
> released for those who are running them.
>
> SunOS versions 4.1.3 and 4.1.4 are still vulnerable to the rpc.statd
> bounce attack with no patches currently released.
>
> Best regards,
>
> Mark Zielinski
> System Security Engineer
> Inficad Communications
>
> -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: 2.6.2
>
> mQCNAzdE6tAAAAEEAMfnIe65PMbIGxZsegpaMME7hSxpJ0HsM0G9hrkR+EXXOLnH
> Rn6oFnaR8mKLGW+3LyAVrDE34O87EyaQ8GKqpDlN9n3wLn7Wm5WuCCRJvEHxwCZZ
> XgQpQoCMQEZNexal3dwVJNRKAvWDFE+rltplYLM8uGLyDnaXOt6aFnLygXxNAAUR
> tA5NYXJrIFppZWxpbnNraQ==
> =+Gj/
> -----END PGP PUBLIC KEY BLOCK-----
>
> On Wed, 9 Jun 1999 aleph1@UNDERGROUND.ORG wrote:
>
> > Date: Wed, 9 Jun 1999 20:05:23 -0700
> > From: aleph1@UNDERGROUND.ORG
> > Reply-To: cert-advisory-request@cert.org
> > To: BUGTRAQ@netspace.org
> > Subject: CERT Advisory CA-99.05 - statd-automountd
> >
> > -----BEGIN PGP SIGNED MESSAGE-----
> >
> > CERT Advisory CA-99-05 Vulnerability in statd exposes vulnerability in
> >       automountd
> >
> >    Original issue date: June 9, 1999
> >    Source: CERT/CC
> >
> > Systems Affected
> >
> >    Systems running older versions of rpc.statd and automountd
> >
> > I. Description
> >
> >    This advisory describes two vulnerabilities that are being used
> >    together by intruders to gain access to vulnerable systems. The first
> >    vulnerability is in rpc.statd, a program used to communicate state
> >    changes among NFS clients and servers. The second vulnerability is in
> >    automountd, a program used to automatically mount certain types of
> >    file systems. Both of these vulnerabilities have been widely discussed
> >    on public forums, such as BugTraq, and some vendors have issued
> >    security advisories related to the problems discussed here. Because of
> >    the number of incident reports we have received, however, we are
> >    releasing this advisory to call attention to these problems so that
> >    system and network administrators who have not addressed these
> >    problems do so immediately.
> >
> >    The vulnerability in rpc.statd allows an intruder to call arbitrary
> >    rpc services with the privileges of the rpc.statd process. The called
> >    rpc service may be a local service on the same machine or it may be a
> >    network service on another machine. Although the form of the call is
> >    constrained by rpc.statd, if the call is acceptable to another rpc
> >    service, the other rpc service will act on the call as if it were an
> >    authentic call from the rpc.statd process.
> >
> >    The vulnerability in automountd allows a local intruder to execute
> >    arbitrary commands with the privileges of the automountd process. This
> >    vulnerability has been widely known for a significant period of time,
> >    and patches have been available from vendors, but many systems remain
> >    vulnerable because their administrators have not yet applied the
> >    appropriate patches.
> >
> >    By exploiting these two vulnerabilities simultaneously, a remote
> >    intruder is able to "bounce" rpc calls from the rpc.statd service to
> >    the automountd service on the same targeted machine. Although on many
> >    systems the automountd service does not normally accept traffic from
> >    the network, this combination of vulnerabilities allows a remote
> >    intruder to execute arbitrary commands with the administrative
> >    privileges of the automountd service, typically root.
> >
> >    Note that the rpc.statd vulnerability described in this advisory is
> >    distinct from the vulnerabilities described in CERT Advisories
> >    CA-96.09 and CA-97.26.
> >
> > II. Impact
> >
> >    The vulnerability in rpc.statd may allow a remote intruder to call
> >    arbitrary rpc services with the privileges of the rpc.statd process,
> >    typically root. The vulnerablility in automountd may allow a local
> >    intruder to execute arbitrary commands with the privileges of the
> >    automountd service.
> >
> >    By combining attacks exploiting these two vulnerabilities, a remote
> >    intruder is able to execute arbitrary commands with the privileges of
> >    the automountd service.
> >
> > Note
> >
> >    It may still be possible to cause rpc.statd to call other rpc services
> >    even after applying patches which reduce the privileges of rpc.statd.
> >    If there are additional vulnerabilities in other rpc services
> >    (including services you have written), an intruder may be able to
> >    exploit those vulnerabilities through rpc.statd. At the present time,
> >    we are unaware of any such vulnerabilitity that may be exploited
> >    through this mechanism.
> >
> > III. Solutions
> >
> >    Install a patch from your vendor
> >
> >    Appendix A contains input from vendors who have provided information
> >    for this advisory. We will update the appendix as we receive more
> >    information. If you do not see your vendor's name, the CERT/CC did not
> >    hear from that vendor. Please contact your vendor directly.
> >
> > Appendix A: Vendor Information
> >
> >    Caldera
> >
> >    Caldera's currently not shipping statd.
> >
> >    Compaq Computer Corporation
> >
> >         (c) Copyright 1998, 1999 Compaq Computer Corporation. All rights
> >                 reserved.
> >                 SOURCE: Compaq Computer Corporation
> >                 Compaq Services
> >                 Software Security Response Team USA
> >                 This reported problem has not been found to affect the as
> >                 shipped, Compaq's Tru64/UNIX Operating Systems Software.
> >                 - Compaq Computer Corporation
> >
> >           Data General
> >
> >         We are investigating. We will provide an update when our
> >                 investigation is complete.
> >
> >           Hewlett-Packard Company
> >
> >         HP is not vulnerable.
> >
> >           The Santa Cruz Operation, Inc.
> >
> >         No SCO products are vulnerable.
> >
> >           Silicon Graphics, Inc.
> >
> >         % IRIX
> >
> >               % rpc.statd
> >                       IRIX 6.2 and above ARE NOT vulnerable.
> >                       IRIX 5.3 is vulnerable, but no longer supported.
> >                       % automountd
> >                       With patches from SGI Security Advisory
> >                       19981005-01-PX installed,
> >                       IRIX 6.2 and above ARE NOT vulnerable.
> >
> >                 % Unicos
> >
> >               Currently, SGI is investigating and no further information
> >                       is
> >                       available for public release at this time.
> >
> >                 As further information becomes available, additional
> >                 advisories
> >                 will be issued via the normal SGI security information
> >                 distribution
> >                 method including the wiretap mailing list.
> >                 SGI Security Headquarters
> >                 http://www.sgi.com/Support/security
> >
> >           Sun Microsystems Inc.
> >
> >         The following patches are available:
> >                 rpc.statd:
> >                 Patch OS Version
> >                 _____ __________
> >                 106592-02 SunOS 5.6
> >                 106593-02 SunOS 5.6_x86
> >                 104166-04 SunOS 5.5.1
> >                 104167-04 SunOS 5.5.1_x86
> >                 103468-04 SunOS 5.5
> >                 103469-05 SunOS 5.5_x86
> >                 102769-07 SunOS 5.4
> >                 102770-07 SunOS 5.4_x86
> >                 102932-05 SunOS 5.3
> >                 The fix for this vulnerability was integrated in SunOS
> >                 5.7 (Solaris 7) before it was released.
> >                 automountd:
> >                 104654-05 SunOS 5.5.1
> >                 104655-05 SunOS 5.5.1_x86
> >                 103187-43 SunOS 5.5
> >                 103188-43 SunOS 5.5_x86
> >                 101945-61 SunOS 5.4
> >                 101946-54 SunOS 5.4_x86
> >                 101318-92 SunOS 5.3
> >                 SunOS 5.6 (Solaris 2.6) and SunOS 5.7 (Solaris 7) are not
> >                 vulnerable.
> >                 Sun security patches are available at:
> >
> >           http://sunsolve.sun.com/pub-cgi/show.pl?target=patches/patch-li
> >           cense&nav=pub-patches
> >           _______________________________________________________________
> >
> >           Our thanks to Olaf Kirch of Caldera for his assistance in
> >           helping us understand the problem and Chok Poh of Sun
> >           Microsystems for his assistance in helping us construct this
> >           advisory.
> >           _______________________________________________________________
> >
> >           This document is available from:
> >           http://www.cert.org/advisories/CA-99-05-statd-automountd.html.
> >           _______________________________________________________________
> >
> > CERT/CC Contact Information
> >
> >         Email: cert@cert.org
> >                 Phone: +1 412-268-7090 (24-hour hotline)
> >                 Fax: +1 412-268-6989
> >                 Postal address:
> >                 CERT Coordination Center
> >                 Software Engineering Institute
> >                 Carnegie Mellon University
> >                 Pittsburgh PA 15213-3890
> >                 U.S.A.
> >
> >           CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) /
> >           EDT(GMT-4) Monday through Friday; they are on call for
> >           emergencies during other hours, on U.S. holidays, and on
> >           weekends.
> >
> > Using encryption
> >
> >           We strongly urge you to encrypt sensitive information sent by
> >           email. Our public PGP key is available from
> >           http://www.cert.org/CERT_PGP.key. If you prefer to use DES,
> >           please call the CERT hotline for more information.
> >
> > Getting security information
> >
> >           CERT publications and other security information are available
> >           from our web site http://www.cert.org/.
> >
> >           To be added to our mailing list for advisories and bulletins,
> >           send email to cert-advisory-request@cert.org and include
> >           SUBSCRIBE your-email-address in the subject of your message.
> >
> >           Copyright 1999 Carnegie Mellon University.
> >           Conditions for use, disclaimers, and sponsorship information
> >           can be found in http://www.cert.org/legal_stuff.html.
> >
> >           * "CERT" and "CERT Coordination Center" are registered in the
> >           U.S. Patent and Trademark Office
> >           _______________________________________________________________
> >
> >           NO WARRANTY
> >           Any material furnished by Carnegie Mellon University and the
> >           Software Engineering Institute is furnished on an "as is"
> >           basis. Carnegie Mellon University makes no warranties of any
> >           kind, either expressed or implied as to any matter including,
> >           but not limited to, warranty of fitness for a particular
> >           purpose or merchantability, exclusivity or results obtained
> >           from use of the material. Carnegie Mellon University does not
> >           make any warranty of any kind with respect to freedom from
> >           patent, trademark, or copyright infringement.
> >
> > -----BEGIN PGP SIGNATURE-----
> > Version: 2.6.2
> >
> > iQCVAwUBN17H2HVP+x0t4w7BAQHspgP+JHCLMDLqm+n64pito2B5jQijAKkK0yEK
> > P3/Lb8ZVgHgzAG9SuuOqBXY9ZxpaxM/gUEE3u4MAyo4ykJi6t3cMQfVDN0h+Ivn4
> > hogmZa+Z4GeocXNvC6KF0KvTA/wgDvA45EXZTJM9tDYNhc93yEJBmUZl7v36WXWM
> > nJ+/XDo+EP4=
> > =fAiP
> > -----END PGP SIGNATURE-----
> >
>

home help back first fref pref prev next nref lref last post