TUCoPS :: BSD :: inetd1.htm

FreeBSD inetd incorrect privileges
Vulnerability

    inetd

Affected

    FreeBSD 3.x, 4.x

Description

    'dynamo'  found  following.    The  inetd   ident  server  is   an
    implementation of the RFC1413 identification server which  returns
    the local username of the user connecting to a remote service.

    During internal auditing, the  internal ident server in  inetd was
    found to incorrectly set  group privileges according to  the user.
    Due to ident  using root's group  permissions, users may  read the
    first 16 (excluding initial whitespace) bytes of  wheel-accessible
    files.  This  is only true  if the internal  ident service is  run
    using the '-f' flag.

    An additional  problem with  the '-f'  flag is  that under certain
    circumstances  the  child  inetd  process  can  be  made to block,
    potentially  allowing  a  resource  starvation  condition  on  the
    server.

    Users can read the first  16 bytes of wheel-accessible files.   To
    determine which  may be  potentially read,  execute the  following
    command as root:

        # find / -group wheel \( -perm -40 -a \! -perm +4 \) -ls

    The inetd internal ident server is not enabled by default.  If you
    have  not  enabled  the  ident  portion  of  inetd,  you  are  not
    vulnerable.

Solution

    Disable the  internal ident  server, if  enabled: comment  out all
    lines  beginning  with  "auth"  in  /etc/inetd.conf,  then restart
    inetd by sending it a SIGHUP:

        # killall -HUP inetd

    Fix:

        ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:11/inetd-4.2.patch
        ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:11/inetd-3.5.1.patch

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH