[13537] in bugtraq

home help back first fref pref prev next nref lref last post

Re: S/Key & OPIE Database Vulnerability

daemon@ATHENA.MIT.EDU (David Maxwell)
Mon Jan 24 21:16:14 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000123221308.B12799@fundy.ca>
Date:         Sun, 23 Jan 2000 22:13:08 -0400
Reply-To: David Maxwell <david@FUNDY.CA>
From: David Maxwell <david@FUNDY.CA>
X-To:         harikiri <harikiri@ATTRITION.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.BSO.4.10.10001210714290.21438-100000@shaolin.fcbl.net>;
              from harikiri on Fri, Jan 21, 2000 at 07:15:20PM -0600

On Fri, Jan 21, 2000 at 07:15:20PM -0600, harikiri wrote:
> w00w00 Security Advisory - http://www.w00w00.org
>
> Title: 		S/Key & OPIE Database Vulnerability
> Platforms: 	BSD/OS 4.0.1 (SKEY).
> 		FreeBSD 3.4-RELEASE (OPIE).
> 		Linux Distributions (with skey-2.2-1 RPM).
> 		Any Unix running skey-2.2. (possibly earlier versions too)
> Discovered:	14th January, 2000

NetBSD began installing a mode 600 /etc/skeykeys file as of Jan 6, 1999.
This issue would not affect the two most recent formal releases, 1.4,
and 1.4.1 - as they include the more secure default.

Users of skey on earlier installs should evaluate appropriate permissions
for their /etc/skeykeys file based on local requirements (e.g. non-setuid
programs performing authentication) - as indicated in the w00w00 advisory.

I'm not a member of the NetBSD security team, I'm just speaking as a user...

--
David Maxwell, david@vex.net|david@maxwell.net -->
Any sufficiently advanced Common Sense will seem like magic...
					      - me

home help back first fref pref prev next nref lref last post