TUCoPS :: Unix :: General :: cert0135.txt


TUCoPS :: Unix :: General :: cert0135.txt

CERT Advisory CA-97.03 csetup

-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-97.03
Original issue date: January 8, 1997
Last revised: May 8, 1997
 Updated the Solution section to include URL for SGI patch
 information.
 A complete revision history is at the end of this file.
Topic: Vulnerability in IRIX csetup
- -----------------------------------------------------------------------------
The CERT Coordination Center has received information about a vulnerability in
the csetup program under IRIX versions 5.x, 6.0, 6.0.1, 6.1, and 6.2. csetup is
not available under IRIX 6.3 and 6.4.
By exploiting this vulnerability, local users can create or overwrite
arbitrary files on the system. With this leverage, they can ultimately gain
root privileges.
Exploitation information involving this vulnerability has been made publicly
available.
We recommend applying a vendor patch when possible. In the meantime, we urge
sites to apply the workaround described in Section III.
We will update this advisory as we receive additional information.
Please check advisory files regularly for updates that relate to your site.
Note: Development of this advisory was a joint effort of the CERT Coordination
 Center and AUSCERT.
- -----------------------------------------------------------------------------
I. Description
 There is a vulnerability in the csetup program under IRIX versions
 5.x, 6.0, 6.0.1, 6.1, and 6.2. csetup is not available under IRIX 6.3
 and 6.4.
 csetup is part of the Desktop System Administration subsystem. The
 program provides a graphical interface allowing privileged users,
 as flagged in the objectserver (cpeople (1M)), or root to modify
 system and network configuration parameters. The csetup program is
 setuid root to allow those who are flagged as privileged users to
 modify system critical files.
 It is possible to configure csetup to run in DEBUG mode, creating a
 logfile in a publicly writable directory. This file is created in an
 insecure manner; and because csetup is running with root privileges at
 the time the logfile is created, it is possible for local users to
 create or overwrite arbitrary files on the system.
 Exploit information involving this vulnerability has been made
 publicly available.
II. Impact
 Anyone with access to an account on the system can create or overwrite
 arbitrary files on the system. With this leverage, they can ultimately
 gain root privileges.
III. Solution
 Patch information for this vulnerability is available
 in SGI"s Security Advisory 19970101-02-PX, available at
 http://www.sgi.com/Support/Secur/security.html/
- -----------------------------------------------------------------------------
This advisory is a collaborative effort between AUSCERT and the CERT
Coordination Center.
The CERT Coordination Center acknowledges Yuri Volobuev for reporting the
original problem, and Silicon Graphics, Inc. for their strong support in the
development of the advisory.
- -----------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see ftp://info.cert.org/pub/FIRST/first-contacts).
CERT/CC Contact Information
- ----------------------------
Email cert@cert.org
Phone +1 412-268-7090 (24-hour hotline)
 CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
 and are on call for emergencies during other hours.
Fax +1 412-268-6989
Postal address
 CERT Coordination Center
 Software Engineering Institute
 Carnegie Mellon University
 Pittsburgh PA 15213-3890
 USA
Using encryption
 We strongly urge you to encrypt sensitive information sent by email. We can
 support a shared DES key or PGP. Contact the CERT/CC for more information.
 Location of CERT PGP key
 ftp://info.cert.org/pub/CERT_PGP.key
Getting security information
 CERT publications and other security information are available from
 http://www.cert.org/
 ftp://info.cert.org/pub/
 CERT advisories and bulletins are also posted on the USENET newsgroup
 comp.security.announce
 To be added to our mailing list for advisories and bulletins, send your
 email address to
 cert-advisory-request@cert.org
- ---------------------------------------------------------------------------
Copyright 1997 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
- ---------------------------------------------------------------------------
This file: ftp://info.cert.org/pub/cert_advisories/CA-97.03.csetup
 http://www.cert.org
 click on "CERT Advisories"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history
May 8, 1997 Updated the Solution section to include URL for SGI patch
 information.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBM3HQYHVP+x0t4w7BAQHsCwP9FNTbUVg7O6f9Pi02OGXifD0zbP2Pjljx
mR9qfATWl4Ti8xW5pc96rK1n68IKPS6QnlX83ruZtASqn1D/uixyfUHJ6nrzgtxK
/yCz2lVrpMy2w9By6V2lIiKkf+DlRZ/573zzDaHPUJR7ODo5d6zWFsjX3GLR2oWq
o2FUKbcyd50=
=WTxZ
-----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH

AltStyle によって変換されたページ (->オリジナル) /