(AUSCERT ESB-98.009) CERT Advisory CA-98.02 - Vulnerabilities in

From: Grant Beattie (Grant.Beattieat_private)
Date: Wed Jan 21 1998 - 14:54:06 PST

  • Next message: Aleph One: "Q179148: Settings May Not Be Applied with URL with Short Filename"

    ------- Forwarded Message
    
    Received: from bastion.fulcrum.com.au (bastion [203.2.211.248])
            by fulcrum.com.au (8.8.6/8.8.6) with ESMTP id JAA21491
            for <auscert-subscriberat_private>; Thu, 22 Jan 1998 09:41:40 +1100 (EST)
    From: auscertat_private
    Received: (from mail@localhost)
            by bastion.fulcrum.com.au (8.8.6/8.8.6) id JAA13696
            for <auscert-subscriberat_private>; Thu, 22 Jan 1998 09:46:34 +1100 (EST)
    Received: from onyx.auscert.org.au(203.5.112.10) by bastion.fulcrum.com.au via smap (V2.0beta)
            id xma013693; Thu, 22 Jan 98 09:46:11 +1100
    Received: from amethyst.auscert.org.au (amethyst.auscert.org.au [203.5.112.218])
            by onyx.auscert.org.au (8.8.7/8.8.7) with ESMTP id IAA01747;
            Thu, 22 Jan 1998 08:45:28 +1000 (EST)
    Received: (from paul@localhost)
            by amethyst.auscert.org.au (8.8.7/8.8.7) id IAA11013;
            Thu, 22 Jan 1998 08:45:25 +1000 (EST)
    Date: Thu, 22 Jan 1998 08:45:25 +1000 (EST)
    Message-Id: <199801212245.IAA11013at_private>
    To: auscert-subscriberat_private
    Sender: auscertat_private
    Reply-To: auscertat_private
    Errors-To: postmasterat_private
    Subject: (AUSCERT ESB-98.009) CERT Advisory CA-98.02 - Vulnerabilities in CDE
    Precedence: list
    
    - -----BEGIN PGP SIGNED MESSAGE-----
    
    ===========================================================================
                  AUSCERT External Security Bulletin Redistribution
    
    
                        ESB-98.009 -- CERT Advisory CA-98.02
                               Vulnerabilities in CDE
                                   22 January 1998
    
    ===========================================================================
    
    The CERT Coordination Center has released the following advisory concerning
    several vulnerabilities in the Common Desktop Environment.  These
    vulnerabilities may allow users to gain unauthorized privileged access or
    cause a denial of service on the system.
    
    The following security bulletin is provided as a service to AUSCERT's
    members.  As AUSCERT did not write this document, AUSCERT has had no
    control over its content.  As such, the decision to use any or all of this
    information is the responsibility of each user or organisation, and should
    be done so in accordance with site policies and procedures.
    
    NOTE: This is only the original release of the security bulletin.  It will
    not be updated when the original bulletin is.  If downloading at a later
    date, it is recommended that the bulletin is retrieved from the original
    authors to ensure that the information is still current.
    
    Contact information for CERT is included in the Security Bulletin below.
    If you have any questions or need further information, please contact them
    directly.
    
    Previous advisories and external security bulletins can be retrieved from:
    
            http://www.auscert.org.au/Information/advisories.html
    
    If you believe that your system has been compromised, contact AUSCERT or your
    representative in FIRST (Forum of Incident Response and Security Teams).
    
    Internet Email: auscertat_private
    Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                    AUSCERT personnel answer during Queensland business hours
                    which are GMT+10:00 (AEST).
                    On call after hours for emergencies.
    Facsimile:      (07) 3365 7031
    
    
    - - --------------------------BEGIN INCLUDED TEXT--------------------
    
    - - -----BEGIN PGP SIGNED MESSAGE-----
    
    =============================================================================
    CERT* Advisory CA-98.02
    Original issue date: Jan. 21, 1998
    Last revised: --
    
    Topic: Vulnerabilities in CDE
    - - - -----------------------------------------------------------------------------
    
    The CERT Coordination Center has received reports of several vulnerabilities
    in some implementations of the Common Desktop Environment (CDE). The root
    cause of these vulnerabilities is that the dtappgather program does not
    adequately check all information passed to it by users. As a result, it is
    possible for a local user to gain unauthorized privileged access or cause a
    denial of service on the system.
    
    We recommend installing a vendor patch as soon as possible. Until you can do
    so, we encourage you to disable vulnerable copies of the program. Section
    III.A. of this advisory contains information on checking for potentially
    vulnerable copies and disabling them. Section III.B and the appendix contain
    vendor information.
    
    We will update this advisory as we receive additional information.  Please
    check our advisory files regularly for updates that relate to your site.
    
    - - - -----------------------------------------------------------------------------
    
    I.   Description
    
         There are several vulnerabilities in some implementations of the Common
         Desktop Environment (CDE). The root cause of these vulnerabilities is
         that the setuid root program "dtappgather" does not adequately check all
         information passed to it by users. By exploiting these vulnerabilities,
         an attacker can gain either unauthorized privileged access or cause a
         denial of service on the system.
    
    
    II.  Impact
    
         Local users are able to gain write access to arbitrary files. This can be
         leveraged to gain privileged access.
    
         Local users may also be able to remove files from arbitrary directories,
         thus causing a denial of service.
    
    
    III. Solution
    
         We recommend installing a vendor patch as soon as possible and disabling
         the vulnerable program until you can do so. Instructions for determining
         whether you have a potentially vulnerable version of this program are
         given in Section A. Vendor patches are discussed in Section B.
    
         A. How to check for and disable potentially vulnerable versions of
            dtappgather
    
            To find potentially vulnerable versions of dtappgather and to
            disable those programs, use the following find(1) command or a
            variant. Consult your local system documentation to determine how
            to tailor the find(1) program on your system.
    
            You will need to run the find(1) command on each system you
            maintain because the command examines files on local disks only.
            Substitute the names of your local file systems for
            FILE_SYSTEM_NAMES in the example. Example local file system names
            are /, /usr, and /var. You should do this as root.
    
            Note that this is one long command, though we have separated
            it onto three lines using backslashes.
    
                 find FILE_SYSTEM_NAMES -xdev -type f -user root \
                        -name 'dtappgather' -perm -04000 -exec ls -l '{}' \; \
                        -ok chmod u-s '{}' \;
    
            This command will find all files on a system that
                - are only in the file systems you name (FILE_SYSTEM_NAMES -xdev)
                - are regular files (-type f)
                - are owned by root (-user root)
                - have the name "dtappgather" (-name 'dtappgather')
                - are setuid (-perm -04000)
    
            Once found, those files will
                - have their names and details printed (-exec ls -l '{}')
                - no longer be setuid root, but only if you type `y' in
                  response to the prompt (-ok chmod u-s '{}' \;)
    
    
            Until you are able to install the appropriate patch, we recommend
            that you remove the setuid bit from the dtappgather program.  Note
            that doing this will affect the functionality of the dtappgather
            program for some users.  For example, newly created users that have
            not logged into the CDE desktop may not have any icons in the
            Application Manager window; existing users may not notice any
            change in functionality.
    
    
         B. Obtain and install a patch for this problem.
    
            If your vendor has a patch for this problem, we encourage you to
            apply the patch as soon as possible.
    
            Appendix A contains a list of vendors who have provided information
            about this problem. We will update the appendix as we receive more
            information. If you do not see your vendor's name, the CERT/CC did
            not hear from that vendor. Please contact your vendor directly.
    
    
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
    Appendix A - Vendor Information
    
    Below is a list of the vendors who have provided information for this
    advisory. We will update this appendix as we receive additional information.
    If you do not see your vendor's name, the CERT/CC did not hear from that
    vendor. Please contact the vendor directly.
    
    
    Digital Equipment Corporation
    - - - ------------------------------
    
      At the time of writing this document, patches(binary kits) are in
      progress. Distribution of the fix for this problem is expected to begin
      soon.  Digital will provide notice of the completion/availability of the
      patches through AES services (DIA, DSNlink FLASH) and be available from
      your normal Digital Support channel.
    
    
    Hewlett-Packard Company
    - - - -----------------------
    
      This problem is addressed HP Security Bulletin 075. This bulletin can be
      found at one of these URLs:
    
         http://us-support.external.hp.com
           (for US, Canada, Asia-Pacific, & Latin-America)
    
         http://europe-support.external.hp.com
           (for Europe)
    
      Security Bulletin 075: Security Vulnerability in CDE on HP-UX
    
      PLATFORM: HP9000 Series 700/800s running CDE on:
              HP-UX 10.10, HP-UX 10.20,
              HP-UX 10.24 (VVOS),
              HP-UX 11.00
    
      SOLUTION:  Apply one of:
               PHSS_13723  HP-UX 10.10
               PHSS_13724  HP-UX 10.20
               PHSS_13725  HP-UX 10.30
               PHSS_13772  HP-UX 10.24
               PHSS_13406  HP-UX 11.00
    
    
    IBM Corporation
    - - - ---------------
    
      The version of dtappgather shipped with AIX is vulnerable.  The
      following fixes are in progress:
    
      AIX 3.2:  not vulnerable; CDE not shipped in 3.2
      AIX 4.1:  IX73436
      AIX 4.2:  IX73437
      AIX 4.3:  IX73438
    
      To Order
      --------
        APARs may be ordered using Electronic Fix Distribution (via FixDist)
        or from the IBM Support Center.  For more information on FixDist,
        reference URL:
    
           http://service.software.ibm.com/aixsupport/
    
        or send e-mail to aixservat_private with a subject of "FixDist".
    
    
      IBM and AIX are registered trademarks of International Business Machines
      Corporation.
    
    
    The Open Group
    - - - --------------
    
      The Open Group is investigating this vulnerability, and if reproduced
      will develop a solution and provide a patch for its CDE licensees.
    
    
    Silicon Graphics, Inc.
    - - - ----------------------
    
      Silicon Graphics provides only the third party TriTeal CDE product.
    
      Triteal Corporation provides all support on the SGI offered CDE product.
      Customers requiring support on the SGI CDE product should contact TriTeal
      Corporation at 1-800-874-8325, or email supportat_private
    
      For other Silicon Graphics related security information, please see the
      SGI Security Headquarters website located at:
    
            http://www.sgi.com/Support/security/security.html
    
    
    Sun Microsystems, Inc.
    - - - ----------------------
    
            105837-01 1.2
            105837-01 1.2_x86
            104498-02 1.02
            104500-02 1.02_x86
            104497-02 1.01
            104499-02 1.01_x86
    
    
    - - - -----------------------------------------------------------------------------
    
    If you believe that your system has been compromised, contact the CERT
    Coordination Center or your representative in the Forum of Incident Response
    and Security Teams (see http://www.first.org/team-info/).
    
    
    CERT/CC Contact Information
    - - - ----------------------------
    Email    certat_private
    
    Phone    +1 412-268-7090 (24-hour hotline)
                    CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
                    and are on call for emergencies during other hours.
    
    Fax      +1 412-268-6989
    
    Postal address
             CERT Coordination Center
             Software Engineering Institute
             Carnegie Mellon University
             Pittsburgh PA 15213-3890
             USA
    
    Using encryption
       We strongly urge you to encrypt sensitive information sent by email. We can
       support a shared DES key or PGP. Contact the CERT/CC for more information.
       Location of CERT PGP key
             ftp://ftp.cert.org/pub/CERT_PGP.key
    
    Getting security information
       CERT publications and other security information are available from
            http://www.cert.org/
            ftp://ftp.cert.org/pub/
    
       CERT advisories and bulletins are also posted on the USENET newsgroup
            comp.security.announce
    
       To be added to our mailing list for advisories and bulletins, send
       email to
            cert-advisory-requestat_private
       In the subject line, type
            SUBSCRIBE  your-email-address
    
    - - - ---------------------------------------------------------------------------
    
    Copyright 1998 Carnegie Mellon University. Conditions for use, disclaimers,
    and sponsorship information can be found in
    http://www.cert.org/legal_stuff.html and ftp://ftp.cert.org/pub/legal_stuff .
    If you do not have FTP or web access, send mail to certat_private with
    "copyright" in the subject line.
    
    *CERT is registered in the U.S. Patent and Trademark Office.
    
    - - - ---------------------------------------------------------------------------
    
    This file: ftp://ftp.cert.org/pub/cert_advisories/CA-98.02.CDE
               http://www.cert.org/pub/alerts.html
    
    
    
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Revision history
    
    
    
    - - -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2
    
    iQCVAwUBNMZnF3VP+x0t4w7BAQGWBQP7BShnArreucgtTS8y7xzx5g0ZjQyzDVbq
    IucgO+CaG3U+HSzNoZ8BWX3TktozL2LmsSqzSMAVzEIOBpi7TZmnXeeRbMHfRKIf
    oR8uqj/6Ilv60Ff9RiIefybO0wsbx5nUmzW3IZAAVFs/YrBMzevWqGhajVlLaQAR
    SGUh+pVQDPE=
    =EhOA
    - - -----END PGP SIGNATURE-----
    
    - - --------------------------END INCLUDED TEXT--------------------
    
    
    - -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3i
    Charset: noconv
    Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
    
    iQCVAwUBNMcGwCh9+71yA2DNAQGQQAQAgwsH0XX+ed+CIIrTLKGoOh6qryyoNBKb
    pBxRJ8hx25zGCnH2IssaWej+fdIau9bo1iEoKE2HH8FPk82AQrZ54DsnO+4W1N0B
    AneLkPYapdSai3itTOZEd0B93OnpZxHKr6dED/ZOD/alr17DDpsjUPRDfPfWlx37
    v/sGyBtk2z4=
    =mQGD
    - -----END PGP SIGNATURE-----
    
    
    ------- End of Forwarded Message
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:40:59 PDT