TUCoPS :: SunOS/Solaris :: cert0025.txt

SunOS source tape vulnerability


-----BEGIN PGP SIGNED MESSAGE-----


CA-91:07                       CERT Advisory
                                May 20, 1991
                 SunOS Source Tape Installation Vulnerability

- -------------------------------------------------------------------------

The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received the following information from Sun Microsystems, Inc. (Sun).
Sun has given the CERT/CC permission to distribute their Security
Bulletin. It contains information regarding a fix for a vulnerability
in SunOS 4.0.3, SunOS 4.1 and SunOS 4.1.1.

The following Sun Microsystems Security Bulletin only applies to systems
that have installed the Sun Source tapes.

For more information, please contact Sun Microsystems at 1-800-USA-4SUN.

- -------------------------------------------------------------------------

    SUN MICROSYSTEMS SECURITY BULLETIN:
    #00107

    This information is only to be used for the purpose of alerting
    customers to problems. Any other use or re-broadcast of this
    information without the express written consent of Sun Microsystems
    shall be prohibited.

    Sun expressly disclaims all liability for any misuse of this information
    by any third party.

    -------------------------------------------------------------------

    Sun Bug ID  : 1059621
    Synopsis    : security hole created by installing sunsrc
    Sun Patch ID: Not applicable see fix below.

    This applies to sites that have installed Sun Source tapes only.
    
    The Sun distribution of sources (sunsrc) has an installation
    procedure which creates the directory /usr/release/bin and
    installs two setuid root files in it: makeinstall and winstall.
    These are both binary files which exec other programs: "make -k install"
    (makeinstall) or "install" (winstall).

    This makes it possible for users on that system to become root.

    The solution:
        chmod ug-s /usr/release/bin/{makeinstall, winstall}
        (if the sources have already been installed)
    and/or
        edit the makefile in sunsrc/release and change the SETUID definition
        (if the sources have been extracted from tape but not installed yet)

    -------------------------------------------------------------------

    Special thanks to CERT and Tel-Aviv University for reporting this
    problem.

    Brad Powell
    Sun Microsystems
    Software Security Coordinator.

- ---------------------------------------------------------------------------

The CERT/CC would like to thank Sun Microsystems, Inc. for their response
to this vulnerability.  We would also like to thank Ariel Cohen from
Tel-Aviv University, School of Mathematical Sciences for reporting the
problem.

- ---------------------------------------------------------------------------

If you believe that your system has been compromised, contact CERT/CC
via telephone or e-mail.

Computer Emergency Response Team/Coordination Center (CERT/CC)
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890

Internet E-mail: cert@cert.org
Telephone: 412-268-7090 24-hour hotline:
           CERT/CC personnel answer 7:30a.m.-6:00p.m. EST,
           on call for emergencies during other hours.

Past advisories and other computer security related information are
available for anonymous ftp from the cert.org (192.88.209.5)
system.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMaMwqnVP+x0t4w7BAQGepgP6A8tusMmhH4xU6QMrxDfGo97XP4cYyGju
1w4Rd+6eX0keE+yuGdtfz6BsSXRdQJpG76U+XHp1W/vDn+4Uht+vT1eDCHM12ZRQ
MXzLkQKtjHw6P8W3zNuXUB9DyKoUNxAx7oLhrGptIYXsLEs5KSIXhioARZjWFzO1
2jR6g/cYF7U=
=0eUg
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH