[30] in Security FYI

home help back first fref pref prev next nref lref last post

current attacks on MIT Irix systems via autofsd

daemon@ATHENA.MIT.EDU (mhpower@MIT.EDU)
Fri Jan 7 16:59:18 2000

From: mhpower@MIT.EDU
Date: Fri, 7 Jan 2000 16:59:09 -0500
Message-Id: <200001072159.QAA09644@the-oz.mit.edu>
To: security-fyi@MIT.EDU
Reply-To: net-security@MIT.EDU

There have been some recent reports of root compromises on SGI Irix
systems at MIT, with the compromise apparently occurring due to a
vulnerability in the autofsd program. It is likely a very good idea to
temporarily stop running autofsd on all Irix systems until a security
patch for this new vulnerability is provided by SGI. The specific
exploit program in use may be one that is not yet publicly
available. There is some discussion of the vulnerability at:

  http://www.mit.edu:8008/menelaus/bt/12332

This is believed to be a different vulnerability than the one
announced by SGI on 22 October 1998 in their security advisory

  ftp://sgigate.sgi.com/security/19981005-01-A

However, the instructions provided in that advisory about shutting
off autofsd provide a useful workaround for the current security
issue. Please refer to that advisory for the specific configuration
steps, which include the command "chkconfig autofs off". If you
are not able to reboot your system right away, you may want to
use the command "/sbin/killall -k 10 autofs autofsd" to eliminate
the running processes associated with the autofs service.

Later today, there may be some more detailed information about this
security issue available on the web page

  http://web.mit.edu/net-security/www/fyi/fyi-2000-001-autofsd.html

Matt Power
Network Security team, MIT Information Systems

home help back first fref pref prev next nref lref last post