[15396] in bugtraq
Re: Veritas Volume Manager 3.0.x hole
daemon@ATHENA.MIT.EDU (Doug Hughes)
Tue Jun 20 13:30:34 2000
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID: <Pine.SOL.4.10.10006181854270.5839-100000@netdir.eng.auburn.edu>
Date: Sun, 18 Jun 2000 19:09:59 -0500
Reply-To: Doug Hughes <doug@ENG.AUBURN.EDU>
From: Doug Hughes <doug@ENG.AUBURN.EDU>
X-To: Dixie Flatline <echo8@WHIP.TWISTEDPAIR.CA>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Pine.LNX.4.20.0006161311110.24059-100000@whip.twistedpair.ca>
On Fri, 16 Jun 2000, Dixie Flatline wrote:
>
> Workaround & Comments
> ---------------------
>
> The trivial workaround: add "umask 022" to /etc/rc2.d/S96vmsa-server
> before the line that starts the Storage Administrator Server.
Don't edit the file. It'd just be changed on the next upgrade, or possibly
even the next patch. It's much better to add a new file in rcS.d, rc2.d,
and rc3.d called S00umask.sh (one in each dir - or link it)
in the files put:
umask 022
It's good innoculation against spurious /tmp files, and it has been
recommended practice for many years.
>
> Perhaps a better fix would be to change Storage Administrator to only
> write process ID numbers to /var/opt/vmsa/logs/.server_pids, and change
> the control script to extract only those PIDs from the file, instead of
> executing the contents. This would still require that permissions on that
> file be sane in order to avoid some level of compromise (otherwise, an
> unprivileged user could kill arbitrary processes). A better approach would
> be to use a utility like pkill(1) to find and kill the appropriate
> processes (a functional equivalent could easily be coded into
> vmsa_server).
>
> I found no previous mention of this hole on SunSolve, (sunsolve.sun.com),
> SecurityFocus (www.securityfocus.com), PacketStorm Security
> (packetstorm.securify.com), the Veritas web site, the main Sun web site, or in
> the archives of the Bugtraq mailing list. My apologies if this is old
> news.
>
> Please send comments to echo8@gh0st.net.
>
There is some mention of S00umask.sh, but it's not obvious..
____________________________________________________________________________
Doug Hughes Engineering Network Services
System/Net Admin Auburn University
doug@eng.auburn.edu