TUCoPS :: Unix :: General :: cert0084.txt


TUCoPS :: Unix :: General :: cert0084.txt

CERT Advisory CA-94:11 majordomo vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-94:11
Original issue date: June 9, 1994
Last revised: August 30, 1996
 Information previously in the README was inserted
 into the advisory. Changed URL format.
 A complete revision history is at the end of this file.
Topic: Majordomo Vulnerabilities
- -----------------------------------------------------------------------------
The CERT Coordination Center has received reports of vulnerabilities in all
versions of Majordomo up to and including version 1.91. These vulnerabilities
enable intruders to gain access to the account that runs the Majordomo
software, even if the site has firewalls and TCP wrappers. 
We recommend that all sites running Majordomo replace their current version
with version 1.92 (see Section III for instructions). It is possible to apply
a quick fix to versions prior to 1.92, but we strongly recommend obtaining
1.92 instead. 
We will update this advisory as we receive additional information.
Please check advisory files regularly for updates that relate to your site.
- -----------------------------------------------------------------------------
I. Description
 Two vulnerabilities have recently been found in Majordomo. These
 vulnerabilities enable intruders to gain access to the account that 
 runs the Majordomo software, thus gaining the ability to execute 
 arbitrary commands. The vulnerabilities can be exploited without 
 a valid user name and password on the local machine, and firewalls 
 and TCP wrapper protection can be bypassed. The CERT/CC has received
 reports that the vulnerabilities are currently being exploited. 
II. Impact
 Intruders can install and execute programs as the user running the
 Majordomo software.
III. Solution
 A. Recommended solution for all versions through 1.92
 Obtain and install Majordomo version 1.93.
 This version is available from
 ftp://ftp.pgh.net/pub/majordomo/
 ftp://ftp.greatcircle.com/pub/majordomo/
 MD5 (majordomo-1.93.README) = 068bb343f23d3119cd196ed4222ab266
 MD5 (majordomo-1.93.tar.Z) = c589a3c3d420d68e096eafdfdac0c8aa
 B. Quick fix for versions 1.91 and earlier
 
 Until you are able to install the new version of Majordomo, you
 should install the following quick fix, which has two steps.
 If you are running Majordomo 1.90 and earlier, you must take both
 steps. If you are running version 1.91, you need only take the 
 first step. 
 Step 1 - Disable new-list by either renaming the new-list program
 or removing it from the aliases file. 
 If you have version 1.90 and earlier, go on to Step 2.
 Step 2 - In every place in the Majordomo code where there is a
 string of any of these forms,
 "|/usr/lib/sendmail -f<whatever> $to" #majordomo.pl
 "|/usr/lib/sendmail -f<whatever> $reply_to" #request-answer
 "|/usr/lib/sendmail -f<whatever> $reply_to $list-approval" # new-list
 "|/usr/lib/sendmail -f<whatever> \$to" #majordomo.cf
 Change that string to
 "|/usr/lib/sendmail -f<whatever> -t"
 Generally, you will find the strings in the request-answer
 file, the majordomo.pl file, and your local majordomo.cf
 file.
 Note: If you are running a mailer other than sendmail, this step 
 may not fix the vulnerability. You should obtain and install
 version 1.92 as described in Section A above.
- ---------------------------------------------------------------------------
The CERT Coordination Center thanks Brent Chapman of Great Circle
Associates and John Rouillard of the University of Massachusetts at
Boston for their support in responding to the problem.
- ---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in Forum of Incident
Response and Security Teams (FIRST).
If you wish to send sensitive incident or vulnerability information to
CERT via electronic mail, CERT strongly advises that the e-mail be
encrypted. CERT can support a shared DES key, PGP (public key
available via anonymous FTP on info.cert.org), or PEM (contact CERT
for details).
Internet E-mail: cert@cert.org
Telephone: 412-268-7090 (24-hour hotline)
 CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
 and are on call for emergencies during other hours.
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
USA
Past advisories, information about FIRST representatives, and other
information related to computer security are available for anonymous 
FTP from info.cert.org.
Copyright 1994, 1995, 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history
Aug. 30, 1996 Information previously in the README was inserted
 into the advisory. Changed URL format.
June 09, 1995 Sec. III.A - pointer to majordomo 1.93
June 1994 Sec. III.A - Added alternative FTP sites
 Sec. III.B - Revised step 2 of the workaround
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMiSoPnVP+x0t4w7BAQF2YwQAi0rNF/MEQ6JuuIHjqbxNDKfXvW3kl+y8
yGZif/VbsUJRs7EOYQAkjgr5+t2oRzt3Y4NgSt2xtxzq5TJiDOZxxevTPLVATZ7d
4lIPmhBl7Cuh6NtOeIyv4UtQghzl+lqjXBhTPCoTObWRjx17xba04QLUZd0g6CXf
0E5dlPKOyMg=
=+2Bq
-----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH

AltStyle によって変換されたページ (->オリジナル) /