[13221] in bugtraq
Re: irix-soundplayer.sh
daemon@ATHENA.MIT.EDU (Dale Southard)
Tue Jan 4 23:22:58 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <14450.27866.876326.673671@opus.science.nd.edu>
Date: Tue, 4 Jan 2000 16:57:46 -0500
Reply-To: Dale Southard <dsouth@ND.EDU>
From: Dale Southard <dsouth@ND.EDU>
X-To: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <200001041821.PAA31683@ing.puc.cl>
pda@ING.PUC.CL writes:
> > midikeys might not setuid these days but you get the idea...
>
> Worked fine on Irix 6.4 here... although i had to change csh to sh
> for some reason... csh returned permission denied, 4755 and all. I
> assume the fix is to take out the suid bit?
Or remove/don't install dmedia_eoe.sw.synth. Though it's included on
standard install of IRIX on newly purchased SGI's, it isn't one of the
packages installed when building a new OS from the 6.5.x CDROMs.
Better yet, follow Security Focus and SGI security lists at the URLs
below. Both Security Focus and SGI have had a security advisory on
the midikeys vulnerability out since May 1999. Both advisories
suggested the above fix.
http://www.sgi.com/Support/security/security.html
http://www.securityfocus.com/
Said another way, there was nothing new about the irix-soundplayer.sh
script -- it exploited a fairly old, widely known vulnerability that
should be fixed on any properly maintained IRIX box. If your machine
still had that hole open, it's likely got several other problems
waiting for the script kiddies to exploit.
The first step in securing any system is realizing the the vendor
didn't do it for you....
--
/* Dale Southard Jr. 219/631-7326 fax:219/631-5952 */
/* Science Computing Associate, dsouth@nd.edu -- pgp accepted */
/* 202A NSH, University of Notre Dame <http://www.nd.edu/~dsouth> */
/* AFF/I,SL/I,T/I,S&TA,D-11216,Sr.Rig "I'd rather be skydiving" */