75 lines
2.9 KiB
Plaintext
75 lines
2.9 KiB
Plaintext
|
**********************************************************************
|
|||
|
DDN Security Bulletin 06 DCA DDN Defense Communications System
|
|||
|
1 Nov 89 Published by: DDN Security Coordination Center
|
|||
|
(SCC@NIC.DDN.MIL) (800) 235-3155
|
|||
|
|
|||
|
DEFENSE DATA NETWORK
|
|||
|
SECURITY BULLETIN
|
|||
|
|
|||
|
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
|
|||
|
Coordination Center) under DCA contract as a means of communicating
|
|||
|
information on network and host security exposures, fixes, & concerns
|
|||
|
to security & management personnel at DDN facilities. Back issues may
|
|||
|
be obtained via FTP (or Kermit) from NIC.DDN.MIL [26.0.0.73 or
|
|||
|
10.0.0.51] using login="anonymous" and password="guest". The bulletin
|
|||
|
pathname is SCC:DDN-SECURITY-nn (where "nn" is the bulletin number).
|
|||
|
|
|||
|
**********************************************************************
|
|||
|
|
|||
|
SUN RCP VULNERABILITY
|
|||
|
|
|||
|
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
|
|||
|
! !
|
|||
|
! The following important advisory was issued by the Computer !
|
|||
|
! Emergency Response Team (CERT) and is being relayed via the Defense !
|
|||
|
! Communications Agency's Security Coordination Center distribution !
|
|||
|
! system as a means of providing DDN subscribers with useful !
|
|||
|
! security information. !
|
|||
|
! !
|
|||
|
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
|
|||
|
|
|||
|
|
|||
|
CERT Advisory
|
|||
|
|
|||
|
October 26, 1989
|
|||
|
|
|||
|
Sun RCP vulnerability
|
|||
|
|
|||
|
A problem has been discovered in the SunOS 4.0.x rcp. If exploited,
|
|||
|
this problem can allow users of other trusted machines to execute
|
|||
|
root-privilege commands on a Sun via rcp.
|
|||
|
|
|||
|
This affects only SunOS 4.0.x systems; 3.5 systems are not affected.
|
|||
|
|
|||
|
A Sun running 4.0.x rcp can be exploited by any other trusted host
|
|||
|
listed in /etc/hosts.equiv or /.rhosts. Note that the other machine
|
|||
|
exploiting this hole does not have to be running Unix; this
|
|||
|
vulnerability can be exploited by a PC running PC/NFS, for example.
|
|||
|
|
|||
|
This bug will be fixed by Sun in version 4.1 (Sun Bug number 1017314),
|
|||
|
but for now the following workaround is suggested by Sun:
|
|||
|
|
|||
|
Change the 'nobody' /etc/passwd file entry from
|
|||
|
|
|||
|
nobody:*:-2:-2::/:
|
|||
|
|
|||
|
to
|
|||
|
|
|||
|
nobody:*:32767:32767:Mismatched NFS ID's:/nonexistant:/nosuchshell
|
|||
|
|
|||
|
|
|||
|
If you need further information about this problem, please contact
|
|||
|
CERT by electronic mail or phone.
|
|||
|
|
|||
|
|
|||
|
J. Paul Holbrook
|
|||
|
Computer Emergency Response Team (CERT)
|
|||
|
Carnegie Mellon University
|
|||
|
Software Engineering Institute
|
|||
|
|
|||
|
Internet: <cert@SEI.CMU.EDU>
|
|||
|
(412) 268-7090 (24 hour hotline)
|
|||
|
*******************************************************************
|
|||
|
|