_____________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
ADVISORY NOTICE
Sun Announces Patches for /etc/utmp Vulnerability
March 21, 1994 1200 PST Number E-13
______________________________________________________________________________
PROBLEM: Vulnerability in SunOS /etc/utmp.
PLATFORM: SunOS 4.1.x systems (but not SunOS 4.1.3_U1 or Solaris 2.x).
DAMAGE: Manipulation of /etc/utmp can result in unauthorized root access.
SOLUTION: Retrieve and install applicable patches.
______________________________________________________________________________
______________________________________________________________________________
VULNERABILITY ASSESSMENT: CIAC considers this vulnerability serious and
advises all system administrators to install these security patches
immediately. This vulnerability is being actively exploited on the Internet.
______________________________________________________________________________
Critical Information about Sun Patches
CIAC has received information from Sun Microsystems regarding the availability
of six patches which will fix the /etc/utmp vulnerability. The following text
is from the Sun Microsystems Security Bulletin #00126:
SunOS 4.1.x systems have been found to be vulnerable to an attack
on the /etc/utmp file. The manipulation of this file, which on
SunOS 4.1.x systems is world-writable, can result in unauthorized root
access for the attacker. We are releasing today patches to several
utilities which close that security hole, identified as bug 1140162.
If the new patches are installed, no other changes--such as making
the /etc/utmp file not world-writable--are necessary to close the
security hole. We recommend that all of the patches be installed.
Solaris 2.x systems, including Solaris x86 systems, are not
susceptible to this attack. SunOS 4.1.3_U1 (Solaris 1.1.1) systems
are also not susceptible. The patches were integrated into
that system before it was released.
The table below contains patch numbers and checksums for the six patches.
Program Patch ID BSD SVR4 MD5 Digital Signature
Checksum Checksum
------- --------- --------- --------- --------------------------------
dump 100593-03 52095 242 41650 484 CDBA530226E8735FAE2BD9BCBFA47DD0
in.comsat 100272-07 26553 39 64651 78 912FF4A0CC8D16A10EECBD7BE102D45C
in.talkd 101480-01 47917 44 32598 88 5C3DFD6F90F739100CFA4AA4C97F01DF
shutdown 101481-01 46562 80 56079 159 BFC257EC795D05646FFA733D1C03855B
syslogd 100909-02 61539 108 38239 216 B5F70772384A3E58678C9C1F52D81190
write 101482-01 61148 41 48636 81 F93276529AA9FC25B35679EBF00B2D6F
The filename for each patch consists of the Patch ID followed by ".tar.Z". For
example, the filename for the dump patch is 100593-03.tar.Z. The checksums
shown in the table are from the BSD-based checksum program distributed with
the system software (on 4.1.x, /bin/sum; on Solaris 2.x, /usr/ucb/sum) and
from the SVR4 version checksum program distributed with Solaris 2.x
(/usr/bin/sum). MD5 software can be retrieved via anonymous FTP from
irbis.llnl.gov in the file /pub/util/crypto/md5.tar (MD5 checksum:
B6B90CC7C56353FC643DF25B6F730D21).
Individuals with Sun support contracts may obtain these patches from their
local Sun Answer Center or from SunSolve Online. Security patches are also
available without a support contract via anonymous FTP from ftp.uu.net (IP
address 192.48.96.9) in the directory /systems/sun/sun-dist.
______________________________________________________________________________
CIAC would like to thank Mark Graff of Sun Microsystems for the information
contained in this advisory.
______________________________________________________________________________
For additional information or assistance, please contact CIAC:
Voice: 510-422-8193
FAX: 510-423-8002
STU-III: 510-423-2604
E-mail: ciac@llnl.gov
Previous CIAC Bulletins and other information are available via anonymous FTP
from irbis.llnl.gov (IP address 128.115.19.60).
______________________________________________________________________________
CIAC has two self-subscribing mailing lists for its two types of electronic
publications: 1. Advisories (highest priority, time critical information) or
Bulletins (important computer security information) and 2. Notes (computer
security articles of general interest). Our mailing lists are managed by a
public domain software package called ListProcessor, which ignores E-mail
header subject lines. To subscribe (add yourself) to one of our mailing lists,
send E-mail to: ciac-listproc@llnl.gov with the following request as the E-mail
message body, substituting CIAC-BULLETIN or CIAC-NOTES for (service) and valid
information for the other items in parentheses:
subscribe (service) (Full_Name) (Phone_number)
You will receive an acknowledgment containing address, initial PIN, and
information on how to change either of them, cancel your subscription, or get
help. Currently, to subscribe to both you must send two separate requests. To
subscribe an address which is a distribution list, first subscribe the person
responsible for your distribution list. You will receive an acknowledgment,
containing address and initial PIN. Change the address to be the distribution
list address by sending a second E-mail request. As the body of this message,
send the following request, substituting valid information for items in
parenthesis:
set (service) address (PIN) (distribution_list_address)
______________________________________________________________________________
PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations and
their constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line: send
first-contacts.
This document was prepared as an account of work sponsored by an agency of the
United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for the
accuracy, completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately owned
rights. Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring by
the United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or reflect those
of the United States Government nor the University of California, and shall not
be used for advertising or product endorsement purposes.
______________________________________________________________________________
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH