TUCoPS :: Linux :: Apps A-M :: innd4.htm


TUCoPS :: Linux :: Apps A-M :: innd4.htm

Internet News Server (innd) vulnerability
Vulnerability
 InterNet News Server (innd) - ucbmail
Affected
 Systems running INN versions 1.5.1 and earlier
Description
 A new vulnerability was found in INN (InterNetNews server) after
 the first vulnerability (see innd #1, #2, #3). This vulnerability
 allows unauthorized users to execute arbitrary commands on the
 machine running INN by sending a maliciously formed news control
 message. Because the problem is with the content of news control
 messages, attacks can be launched remotely and may reach news
 servers located behind Internet firewalls.
 This second vulnerability involving INN is similar to first. INN
 itself attempts to carefully remove certain shell "metacharacters"
 from data in control messages before passing that data to a shell.
 The patch for vulnerabilities described as innd #1, #2 and #3
 fix some of the checks that were found to be inadequate. However
 ucbmail, a program typically configured as the mailer INN should
 use, lacks similar checks. INN passes some data unchecked to this
 mailer, which in turn passes the data to a shell for processing.
 Remote, unauthorized users can execute arbitrary commands on the
 system with the same privileges as the innd (INN daemon) process.
 Attacks may reach news servers located behind Internet firewalls.
 Michal Jankowski pointed out that this bug is actually in the
 "mail" program and doesn't need INN to be exploited and added
 trivia example of sending to somebody (to root, preferably) a
 mail with "Reply-To: |some-interesting-command-here" in hope
 he'll use ucb mail to reply to this letter. Still, this is not
 confirmed to work (yet).
Solution
 James Brister, the current maintainer of INN, has made a patch
 available that checks more data before it is passed to the mailer
 program. Although only the ucbmail program is known to have this
 problem, sites are encouraged to apply the patch regardless of
 what mail program their INN is configured to use.
 The current version of INN is 1.5.1. It is not vulnerable to the
 first described in innd #1, #2 and #3, but it is vulnerable to the
 second, so a patch is necessary.
 INN 1.5.1 and information about it are available from
 http://www.isc.org/inn.html
 The patch is available from
 ftp://ftp.isc.org:/isc/inn/patches/security-patch.04
 If you do not upgrade to 1.5.1, apply a patch for the version you
 are running and then apply the newly released patch that addresses
 the second vulnerability discussed here. If you are running INN
 1.4sec2, you should upgrade to 1.5.1 as no patches are available.
 FIRST apply:
 version patch
 ------- -----
 1.5 ftp://ftp.isc.org/isc/inn/patches/security-patch.01
 1.4sec ftp://ftp.isc.org/isc/inn/patches/security-patch.02
 1.4unoff3, 1.4unoff4 ftp://ftp.isc.org/isc/inn/patches/security-patch.03
 THEN apply (1.5.1, 1.5, 1.4sec, 1.4unoff3, 1.4unoff4)
 ftp://ftp.isc.org:/isc/inn/patches/security-patch.04
 After installing any of the patches or updates, ensure that you
 restart your INN server.
 Vendor notices and patches for this vulnerability (for now):
 NEC Corporation
 Products below are shipped with INN mentioned in this advisory,
 so they are vulnerable and patches are in progress.
 Goah/NetworkSV R1.2 vulnerable
 Goah/NetworkSV R2.2 vulnerable
 Goah/NetworkSV R3.1 vulnerable
 Goah/IntraSV R1.1 vulnerable
 Red Hat Linux
 There is a critical security hole in INN which affects all
 versions of Red Hat Linux. A new version, inn-1.5.1-6, is now
 available for Red Hat Linux 4.0 and 4.1 for all platforms. If you
 are running an earlier version of Red Hat, we strongly encourage
 you to upgrade to 4.1 as soon as possible, as many critical
 security fixes have been made. The new version of inn is PGP
 signed with the Red Hat PGP key, which is available on all Red
 Hat CDROMs, ftp.redhat.com, and public keyservers.
 You may upgrade to the new version as follows:
 Red Hat 4.1
 -----------
 i386:
 rpm -Uvh ftp://ftp.redhat.com/updates/4.1/i386/inn-1.5.1-6.i386.rpm
 alpha:
 rpm -Uvh ftp://ftp.redhat.com/updates/4.1/alpha/inn-1.5.1-6.alpha.rpm
 SPARC:
 rpm -Uvh ftp://ftp.redhat.com/updates/4.1/sparc/inn-1.5.1-6.sparc.rpm
 Red Hat 4.0
 i386:
 rpm -Uvh ftp://ftp.redhat.com/updates/4.0/i386/inn-1.5.1-6.i386.rpm
 alpha:
 rpm -Uvh ftp://ftp.redhat.com/updates/4.0/alpha/inn-1.5.1-6.alpha.rpm
 SPARC:
 rpm -Uvh ftp://ftp.redhat.com/updates/4.0/sparc/inn-1..5.1-6.sparc.rpm
 After installing any of the patches or updates, ensure that you
 restart your INN server.

AltStyle によって変換されたページ (->オリジナル) /

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH