[7789] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [linux-security] Linux UNFSD Security Problems

daemon@ATHENA.MIT.EDU (A Mennucc1)
Fri Aug 28 12:22:02 1998

Date: 	Fri, 28 Aug 1998 17:55:16 +0200
Reply-To: A Mennucc1 <msm@TONELLI.SNS.IT>
From: A Mennucc1 <msm@TONELLI.SNS.IT>
X-To:         Olaf Kirch <okir@monad.swb.de>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <19980828132740.A20202@monad.swb.de>; from Olaf Kirch on Fri,
              Aug 28, 1998 at 01:27:40PM +0200

--0OAP2g/MAC+5xKAE
Content-Type: text/plain; charset=us-ascii

On Fri, Aug 28, 1998 at 01:27:40PM +0200, Olaf Kirch wrote:
> I've got egg on my face... There is a nasty security hole in the
> User-space NFS servers. If you are running an NFS server, please
> upgrade as soon as possible to the latest release,
> nfs-server-2.2beta35.tar.gz, which can be found at
>
> ftp://linux.mathematik.tu-darmstadt.de/pub/linux/people/okir
>
> All previous releases are vulnerable.
>
>
> <Taking off his okir hat and putting on his caldera hat>
>
> Caldera will, after they have passed testing, release fixed RPMs.
> They will be available from
>
> ftp://ftp.caldera.com/pub/OpenLinux/updates/1.2/
>
> Olaf
> --
> Olaf Kirch         |  --- o --- Nous sommes du soleil we love when we play
> okir@monad.swb.de  |    / | \   sol.dhoop.naytheet.ah kin.ir.samse.qurax
> okir@caldera.de    +-------------------- Why Not?! -----------------------
>          UNIX, n.: Spanish manufacturer of fire extinguishers.
>
> --
> ----------------------------------------------------------------------
> Please refer to the information about this list as well as general
> information about Linux security at http://www.aoy.com/Linux/Security.
> ----------------------------------------------------------------------
>
> To unsubscribe:
>   mail -s unsubscribe linux-security-request@redhat.com < /dev/null



hi

while we are waiting for a fix,
I propose this short script for people running
 Linux 2.0

it will use  ip input firewalling  to stop accesses to RPC services
but from a list of allowed hosts.
The script is self explaining (and gives help with -h )

bye

a.m.

--
--
Legal Warning: Anyone sending me unsolicited/commercial email WILL be charged
a $100 proof-reading fee.  Do NOT send junk email to me - consider this an
official notice:

"By US Code Title 47, Sec.227(a)(2)(B), a computer/modem/printer meets the
 definition of a telephone fax machine.  By Sec.227(b)(1)(C), it is unlawful
 to send any unsolicited advertisement to such equipment.  By Sec.227(b)(3)(C),
 a violation of the aforementioned Section is punishable by action to recover
 actual monetary loss, or $500, whichever is greater, for each violation."

--0OAP2g/MAC+5xKAE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename=protect_rpc_ports

#!/bin/sh

# protect_rcp_ports
#      by A.Mennucc1 msm@tonelli.sns.it  Aug 98
#see below for help


RUN=/var/run

p=`basename $0`

P=$RUN/$p.save

#file containing list of hosts allowed to use rpc ports
A=/etc/hosts.allow.d/portmapper

###########help
if [ "$1" = -h -o "$1" = --help ] ; then
cat <<EOF
Usage: $p [ --replace ]
 It protects the RPC ports from accesses
 but from hosts listed in $A
 uses ipfwadm -I
 NOTE with --replace it destroyes all  ip input firewalling previously found!
  and puts just a basic firewalling; it is good if you dont use ip input
  firewalling for other reasons and you decide to run $p
  by cron every 5 minutes (good, in case the RPC ports change).
EOF
exit
fi

[ -r $P ] && mv $P $P~


if [ "$1" = --replace ] ;
then
 #clear all
 ipfwadm -I -f


 ipfwadm -I -d deny -o -P all -S 127.0.0.0/8 -W eth0 -D 0/0 2>/dev/null || true
 ipfwadm -I -d deny -o -P all -S 127.0.0.0/8 -W eth1 -D 0/0 2>/dev/null || true
 ipfwadm -I -i deny -o -P all -S 127.0.0.0/8 -W eth0 -D 0/0 >/dev/null
 ipfwadm -I -i deny -o -P all -S 127.0.0.0/8 -W eth1 -D 0/0
fi


rpcinfo -p | awk '//{print $4}' | grep -x '[0-9]*' | sort -u > $P


for i in  `cat $P ` ;
do


 if [ -r $A ] ; then
  for h in  ` cat $A ` ;
  do
   ipfwadm  -I -a accept -P tcp -S $h -D 0/0 $i
   ipfwadm  -I -a accept -P udp -S $h -D 0/0 $i
  done
 fi


 ipfwadm  -I -a reject -P tcp -S 0/0 -D 0/0 $i
 ipfwadm  -I -a reject -P udp -S 0/0 -D 0/0 $i


done


--0OAP2g/MAC+5xKAE--

home help back first fref pref prev next nref lref last post