|
_____________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | / \ / \___ __|__ /___\ \___ _____________________________________________________ ADVISORY NOTICE Sun Announces Patches for /etc/utmp Vulnerability March 21, 1994 1200 PST Number E-13 ______________________________________________________________________________ PROBLEM: Vulnerability in SunOS /etc/utmp. PLATFORM: SunOS 4.1.x systems (but not SunOS 4.1.3_U1 or Solaris 2.x). DAMAGE: Manipulation of /etc/utmp can result in unauthorized root access. SOLUTION: Retrieve and install applicable patches. ______________________________________________________________________________ ______________________________________________________________________________ VULNERABILITY ASSESSMENT: CIAC considers this vulnerability serious and advises all system administrators to install these security patches immediately. This vulnerability is being actively exploited on the Internet. ______________________________________________________________________________ Critical Information about Sun Patches CIAC has received information from Sun Microsystems regarding the availability of six patches which will fix the /etc/utmp vulnerability. The following text is from the Sun Microsystems Security Bulletin #00126: SunOS 4.1.x systems have been found to be vulnerable to an attack on the /etc/utmp file. The manipulation of this file, which on SunOS 4.1.x systems is world-writable, can result in unauthorized root access for the attacker. We are releasing today patches to several utilities which close that security hole, identified as bug 1140162. If the new patches are installed, no other changes--such as making the /etc/utmp file not world-writable--are necessary to close the security hole. We recommend that all of the patches be installed. Solaris 2.x systems, including Solaris x86 systems, are not susceptible to this attack. SunOS 4.1.3_U1 (Solaris 1.1.1) systems are also not susceptible. The patches were integrated into that system before it was released. The table below contains patch numbers and checksums for the six patches. Program Patch ID BSD SVR4 MD5 Digital Signature Checksum Checksum ------- --------- --------- --------- -------------------------------- dump 100593-03 52095 242 41650 484 CDBA530226E8735FAE2BD9BCBFA47DD0 in.comsat 100272-07 26553 39 64651 78 912FF4A0CC8D16A10EECBD7BE102D45C in.talkd 101480-01 47917 44 32598 88 5C3DFD6F90F739100CFA4AA4C97F01DF shutdown 101481-01 46562 80 56079 159 BFC257EC795D05646FFA733D1C03855B syslogd 100909-02 61539 108 38239 216 B5F70772384A3E58678C9C1F52D81190 write 101482-01 61148 41 48636 81 F93276529AA9FC25B35679EBF00B2D6F The filename for each patch consists of the Patch ID followed by ".tar.Z". For example, the filename for the dump patch is 100593-03.tar.Z. The checksums shown in the table are from the BSD-based checksum program distributed with the system software (on 4.1.x, /bin/sum; on Solaris 2.x, /usr/ucb/sum) and from the SVR4 version checksum program distributed with Solaris 2.x (/usr/bin/sum). MD5 software can be retrieved via anonymous FTP from irbis.llnl.gov in the file /pub/util/crypto/md5.tar (MD5 checksum: B6B90CC7C56353FC643DF25B6F730D21). Individuals with Sun support contracts may obtain these patches from their local Sun Answer Center or from SunSolve Online. Security patches are also available without a support contract via anonymous FTP from ftp.uu.net (IP address 192.48.96.9) in the directory /systems/sun/sun-dist. ______________________________________________________________________________ CIAC would like to thank Mark Graff of Sun Microsystems for the information contained in this advisory. ______________________________________________________________________________ For additional information or assistance, please contact CIAC: Voice: 510-422-8193 FAX: 510-423-8002 STU-III: 510-423-2604 E-mail: ciac@llnl.gov Previous CIAC Bulletins and other information are available via anonymous FTP from irbis.llnl.gov (IP address 128.115.19.60). ______________________________________________________________________________ CIAC has two self-subscribing mailing lists for its two types of electronic publications: 1. Advisories (highest priority, time critical information) or Bulletins (important computer security information) and 2. Notes (computer security articles of general interest). Our mailing lists are managed by a public domain software package called ListProcessor, which ignores E-mail header subject lines. To subscribe (add yourself) to one of our mailing lists, send E-mail to: ciac-listproc@llnl.gov with the following request as the E-mail message body, substituting CIAC-BULLETIN or CIAC-NOTES for (service) and valid information for the other items in parentheses: subscribe (service) (Full_Name) (Phone_number) You will receive an acknowledgment containing address, initial PIN, and information on how to change either of them, cancel your subscription, or get help. Currently, to subscribe to both you must send two separate requests. To subscribe an address which is a distribution list, first subscribe the person responsible for your distribution list. You will receive an acknowledgment, containing address and initial PIN. Change the address to be the distribution list address by sending a second E-mail request. As the body of this message, send the following request, substituting valid information for items in parenthesis: set (service) address (PIN) (distribution_list_address) ______________________________________________________________________________ PLEASE NOTE: Many users outside of the DOE and ESnet computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained by sending email to docserver@first.org with an empty subject line and a message body containing the line: send first-contacts. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government nor the University of California, and shall not be used for advertising or product endorsement purposes. ______________________________________________________________________________