TUCoPS :: Linux :: Apps A-M :: innd4.htm

Internet News Server (innd) vulnerability
Vulnerability

    InterNet News Server (innd) - ucbmail

Affected

    Systems running INN versions 1.5.1 and earlier

Description

    A new vulnerability was  found in INN (InterNetNews  server) after
    the first vulnerability (see innd #1, #2, #3). This  vulnerability
    allows unauthorized  users to  execute arbitrary  commands on  the
    machine running INN by  sending a maliciously formed  news control
    message.  Because the problem is with the content of news  control
    messages,  attacks  can  be  launched  remotely and may reach news
    servers located behind Internet firewalls.

    This second vulnerability involving INN is similar to first.   INN
    itself attempts to carefully remove certain shell "metacharacters"
    from data in control messages before passing that data to a shell.
    The patch  for vulnerabilities  described as  innd #1,  #2 and  #3
    fix some of the checks  that were found to be  inadequate. However
    ucbmail, a program typically  configured as the mailer  INN should
    use, lacks similar checks. INN passes some data unchecked to  this
    mailer, which in turn passes the data to a shell for processing.

    Remote, unauthorized users can  execute arbitrary commands on  the
    system with the same privileges as the innd (INN daemon)  process.
    Attacks may reach news servers located behind Internet firewalls.

    Michal Jankowski  pointed out  that this  bug is  actually in  the
    "mail" program  and doesn't  need INN  to be  exploited and  added
    trivia  example  of  sending  to  somebody (to root, preferably) a
    mail  with  "Reply-To:  |some-interesting-command-here"  in   hope
    he'll use ucb mail  to reply to this  letter.  Still, this  is not
    confirmed to work (yet).

Solution

    James Brister,  the current  maintainer of  INN, has  made a patch
    available that checks more data before it is passed to the  mailer
    program. Although only the ucbmail  program is known to have  this
    problem, sites  are encouraged  to apply  the patch  regardless of
    what mail program their INN is configured to use.

    The current version of INN is  1.5.1. It is not vulnerable to  the
    first described in innd #1, #2 and #3, but it is vulnerable to the
    second, so a patch is necessary.

    INN 1.5.1 and information about it are available from

        http://www.isc.org/inn.html

    The patch is available from

        ftp://ftp.isc.org:/isc/inn/patches/security-patch.04

    If you do not upgrade to 1.5.1, apply a patch for the version  you
    are running and then apply the newly released patch that addresses
    the second vulnerability  discussed here. If  you are running  INN
    1.4sec2, you should upgrade to 1.5.1 as no patches are available.

    FIRST apply:

    version               patch
    -------               -----
    1.5                   ftp://ftp.isc.org/isc/inn/patches/security-patch.01
    1.4sec                ftp://ftp.isc.org/isc/inn/patches/security-patch.02
    1.4unoff3, 1.4unoff4  ftp://ftp.isc.org/isc/inn/patches/security-patch.03

    THEN apply (1.5.1, 1.5, 1.4sec, 1.4unoff3, 1.4unoff4)

        ftp://ftp.isc.org:/isc/inn/patches/security-patch.04

    After installing any  of the patches  or updates, ensure  that you
    restart your INN server.

    Vendor notices and patches for this vulnerability (for now):

    NEC Corporation

    Products below are  shipped with INN  mentioned in this  advisory,
    so they are vulnerable and patches are in progress.

        Goah/NetworkSV R1.2     vulnerable
        Goah/NetworkSV R2.2     vulnerable
        Goah/NetworkSV R3.1     vulnerable
        Goah/IntraSV R1.1       vulnerable

    Red Hat Linux

    There  is  a  critical  security  hole  in  INN  which affects all
    versions of  Red Hat  Linux. A  new version,  inn-1.5.1-6, is  now
    available for Red Hat Linux 4.0 and 4.1 for all platforms. If  you
    are running an earlier version  of Red Hat, we strongly  encourage
    you  to  upgrade  to  4.1  as  soon  as possible, as many critical
    security  fixes  have  been  made.  The  new version of inn is PGP
    signed with the  Red Hat PGP  key, which is  available on all  Red
    Hat CDROMs, ftp.redhat.com, and public keyservers.

    You may upgrade to the new version as follows:

    Red Hat 4.1
    -----------

    i386:
    rpm -Uvh ftp://ftp.redhat.com/updates/4.1/i386/inn-1.5.1-6.i386.rpm

    alpha:
    rpm -Uvh ftp://ftp.redhat.com/updates/4.1/alpha/inn-1.5.1-6.alpha.rpm

    SPARC:
    rpm -Uvh ftp://ftp.redhat.com/updates/4.1/sparc/inn-1.5.1-6.sparc.rpm

    Red Hat 4.0

    i386:
    rpm -Uvh ftp://ftp.redhat.com/updates/4.0/i386/inn-1.5.1-6.i386.rpm

    alpha:
    rpm -Uvh ftp://ftp.redhat.com/updates/4.0/alpha/inn-1.5.1-6.alpha.rpm

    SPARC:
    rpm -Uvh ftp://ftp.redhat.com/updates/4.0/sparc/inn-1..5.1-6.sparc.rpm

    After installing any  of the patches  or updates, ensure  that you
    restart your INN server.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH