[2515] in bugtraq

home help back first fref pref prev next nref lref last post

[Fwd: HTTPd 1.5a Security Hole!!! (fwd)]

daemon@ATHENA.MIT.EDU (Rogue Agent)
Wed Feb 7 01:48:43 1996

Date:         Tue, 6 Feb 1996 19:28:04 -0500
Reply-To: Bugtraq List <BUGTRAQ@CRIMELAB.COM>
From: Rogue Agent <agent@l0pht.com>
X-To:         bugtraq@CRIMELAB.COM
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@CRIMELAB.COM>

---------- Forwarded message ----------
Date: Tue, 6 Feb 1996 17:47:08 -0600
From: John P. Nelson <jnelson@INTERNOC.COM>
To: Multiple recipients of list IAP <IAP@VMA.CC.ND.EDU>
Subject: HTTPd 1.5a Security Hole!!!

VERY IMPORTANT for Internet Service Providers using linux, providing
public WWW space!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
--------------------------------------------------------------------
FROM:   The InterNetwork Operating Company, Inc.
RE:     InterNOC Security Advisory

Known Affected Systems:
        Linux 1.2.8 using NCSA HTTPd 1.5a

Description:

        The InterNetwork Operating Company has discovered a security hole
related to Linux 1.2.8 and NCSA HTTPd 1.5a.  In affected systems, the
NCSA server, running as nobody/nogroup is able to access any files that are
mode ?00 (readable only by owner).

        The security hole is known to occur through symbolic links as
well as through aliases specified in the srm.conf file.

        It is known that through properly placed symbolic links, it is
possible to obtain the shadow password file, user mail files, etc.  This
is extermely important for public Internet Service Providers that provide
users with WWW space.

        This same security hole has been tested on BSDI 2.0.1, which does
not appear to be affected.  It has not yet been tested on other systems
or with other http servers.

                jnelson@internoc.com
                John Nelson
                The InterNetwork Operating Company, Inc.

home help back first fref pref prev next nref lref last post