TUCoPS :: SunOS/Solaris :: 9103.txt

Patch Available for SunOS in.telnetd

***********************************************************************
DDN Security Bulletin 9103       DCA DDN Defense Communications System
27 Mar 91               Published by: DDN Security Coordination Center
                                     (SCC@NIC.DDN.MIL)  (800) 235-3155

                        DEFENSE  DATA  NETWORK
                          SECURITY  BULLETIN

The DDN  SECURITY BULLETIN  is distributed  by the  DDN SCC  (Security
Coordination Center) under  DCA contract as  a means of  communicating
information on network and host security exposures, fixes, &  concerns
to security & management personnel at DDN facilities.  Back issues may
be  obtained  via  FTP  (or  Kermit)  from  NIC.DDN.MIL  [192.67.67.20]
using login="anonymous" and password="guest".  The bulletin pathname is
SCC:DDN-SECURITY-yynn (where "yy" is the year the bulletin is issued
and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-9001).
**********************************************************************

                    Patch Available for SunOS in.telnetd


+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
!                                                                       !
!     The following important  advisory was  issued by the Computer     !
!     Incident Advisory Capability (CIAC) and is being relayed unedited !
!     via the Defense Communications Agency's Security Coordination     !
!     Center  distribution  system  as a  means  of  providing  DDN     !
!     subscribers with useful security information.                     !
!                                                                       !
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +



                           NO RESTRICTIONS
        _____________________________________________________
             The Computer Incident Advisory Capability
                         ___  __ __    _     ___
                        /       |     / \   /
                        \___  __|__  /___\  \___
        _____________________________________________________
                         Information Bulletin

March 26, 1991, 1330 PST                                     Number B-20

                    Patch Available for SunOS in.telnetd
________________________________________________________________________
PROBLEM:  SunOS versions 4.0.3 through 4.1.1 in.telnetd exhibits may
          send output to an authorized user.  
PLATFORM: All Sun3 and Sun4 computers running SunOS 4.0.3, 4.1 or
          4.1.1.  
DAMAGE:   May allow unauthorized access to the system.
SOLUTIONS:  Patch/update available from Sun.  
IMPACT OF PATCH:  Vulnerability eliminated.  No other side-effects
          reported.
_______________________________________________________________________
		 Critical Information about in.telnetd Patch

Sun Microsystems has recently announced the availability of a new patch
for the utility in.telnetd (the daemon that controls the remote login
program, telnet).  If not patched this utility may allow unauthorized
access to systems.  The patch is available from Sun Microsystems as
Patch ID# 100125-02 (this number is required to order this patch from
the Sun Answer Center).  This patch is also available via anonymous ftp
at uunet.uu.net (IP# 192.48.96.2) in the file
sun-dist/100125-02.tar.Z.  If you obtain the patch using anonymous ftp,
no additional installation instructions are necessary.  If you obtain
the patch in some other manner (e.g., from CIAC), we suggest that you
use the following installation procedure:

1.	Log in as root on the system to be repaired.

2.	Disable the flawed version of in.telnetd with the following 
commands:

	# mv /usr/etc/in.telnetd /usr/etc/in.telnetd.FCS
	# chmod 600 /usr/etc/in.telnetd.FCS

3.	Obtain the patch file 100125-02.tar.Z (either from Sun or a trusted 
anonymous FTP site such as uunet.uu.net).

4.	Uncompress the patch file:

	# uncompress 100125-02.tar.Z

5.      Extract the patch file appropriate to your architecture (either
3, 3x, 4, or 4c -- contact your Sun representative if you do not know
which architecture you have)

	# tar xf 100125-02.tar {architecture}/in.telnetd
	where {architecture} is one of 3, 3x, 4, or 4c.

6.      Copy the patch file to the appropriate directory, and set the
ownership and permissions of the utility:

	# cp {architecture}/in.telnetd /usr/etc/in.telnetd
	# chown root.staff /usr/etc/in.telnetd
	# chmod 755 /usr/etc/in.telnetd

7.	Kill any existing telnet processes that may be running.

	# ps ugax | grep in.telnetd
	# kill -9 ####
	where #### is the number of each in.telnetd process found in
	the previous command.  Please note that this command may
	disrupt ongoing sessions of users attempting to use the
	system.  As an alternative to this step, you may consider
	rebooting the computer, allowing time for all current users to
	log out.

Once you have verified that the new version of telnet is operational,
it is advisable to delete the unpatched version of the utility
(/usr/etc/in.telnetd.FCS) to prevent its unauthorized use.

For additional information or assistance, please contact CIAC:   
 
	Tom Longstaff
	(415) 423-4416 or (FTS) 543-4416

	Call CIAC at (415) 422-8193 or (FTS) 532-8193 or 
        send e-mail to ciac@cheetah.llnl.gov.  
    
	Send FAX messages to:  (415) 423-0913 or (FTS) 543-0913

Sun Microsystems provided information contained in this bulletin.  This
document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor
the University of California nor any of their employees, makes any
warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights. Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation or favoring by the
United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government or the University of
California, and shall not be used for advertising or product
endorsement purposes.
Organization:  National Institute of Standards and Technology (NIST)
Sub-Organization:  National Computer Systems Laboratory





TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH