|
COMMAND ftpd, popper, scoadmin and sort buffer overflows, insecure tmp files, hijacking SYSTEMS AFFECTED OpenServer 5.0.5 & 5.0.6 (all except ftpd) Open UNIX 8.0.0 & UnixWare 7.1.1 (for ftpd only) PROBLEM In Caldera Security Advisories : popper buffer overflow and denial-of-service [CSSA-2002-SCO.20]: (Marcell Fodor reported the memory fault issue. Dustin Childers reported the denial-of-service issue.) /etc/popper will go into a loop if a character string of length 2048 (or more) is sent to it. If the bulldir variable in the user\'s config file is longer than 256 characters, popper will memory fault. =============================== sort command creates temporary files insecurely [CSSA-2002-SCO.21]: The sort command creates and uses temporary files insecurely. Names can be predicted, and spoofed with symbolic links. =============================== scoadmin command creates temporary files insecurely [CSSA-2002-SCO.22]: The scoadmin command creates and uses temporary files insecurely. Names can be predicted, and spoofed with symbolic links. impacted binaries: /etc/sysadm.d/lib/sysadm.tlib /etc/sysadm.d/lib/sysadm.tndx =============================== ftpd allows data connection hijacking via PASV mode [CSSA-2002-SCO.23]: In FTP PASV mode, the client makes a control connection to the FTP server (typically port 21/tcp) and requests a PASV data connection. The server responds by listening for client connections on a specified port number, which is supplied to the client via the control connection. If an attacker can make a connection to the listening port before the client connects, the server will transmit the data to the attacker instead of the client. To exploit this vulnerability, the attacker must intercept or guess the port number that the server will use, then make its connection attempt before the client establishes a data connection. If the server chooses port numbers using an easily identifiable pattern (such as incrementally), this vulnerability is trivial to exploit. Update (04 june 2002) ====== Tomasz Grabowski added following info: It is also possible to hijack data connection while using active mode. The only difference is that the attacker need to connect to the listening port on the client machine. SOLUTION popper: install latest binaries ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.20 sort: install latest binaries ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.21 scoadmin: install latest binaries ftp://stage.caldera.com/pub/security/openserver/CSSA-2002-SCO.22 ftpd: install latest binaries ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.23