what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CA-97.03.csetup

CA-97.03.csetup
Posted Sep 14, 1999

A vulnerability in the csetup program under IRIX versions 5.x, 6.0, 6.0.1, 6.1, and 6.2 allows local users to create or overwrite arbitrary files on the system and ultimately gain root privileges. A workaround is provided.

tags | arbitrary, local, root
systems | irix
SHA-256 | 416f58f59d17dbd153e723dbab1d8e7ed23d3fe6e91a316877ce82acaaaed8ab

CA-97.03.csetup

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----


=============================================================================
CERT(sm) Advisory CA-97.03
Original issue date: January 8, 1997

Last Revised: December 15, 1997 - Added vendor information for Data
General to UPDATES.

A complete revision history is at the end of this file.


Topic: Vulnerability in IRIX csetup
- -----------------------------------------------------------------------------

The CERT Coordination Center has received information about a vulnerability in
the csetup program under IRIX versions 5.x, 6.0, 6.0.1, 6.1, and 6.2. csetup is
not available under IRIX 6.3 and 6.4.

By exploiting this vulnerability, local users can create or overwrite
arbitrary files on the system. With this leverage, they can ultimately gain
root privileges.

Exploitation information involving this vulnerability has been made publicly
available.

We recommend applying a vendor patch when possible. In the meantime, we urge
sites to apply the workaround described in Section III.

We will update this advisory as we receive additional information.
Please check advisory files regularly for updates that relate to your site.

Note: Development of this advisory was a joint effort of the CERT Coordination
Center and AUSCERT.
- -----------------------------------------------------------------------------

I. Description

There is a vulnerability in the csetup program under IRIX versions
5.x, 6.0, 6.0.1, 6.1, and 6.2. csetup is not available under IRIX 6.3
and 6.4.

csetup is part of the Desktop System Administration subsystem. The
program provides a graphical interface allowing privileged users,
as flagged in the objectserver (cpeople (1M)), or root to modify
system and network configuration parameters. The csetup program is
setuid root to allow those who are flagged as privileged users to
modify system critical files.

It is possible to configure csetup to run in DEBUG mode, creating a
logfile in a publicly writable directory. This file is created in an
insecure manner; and because csetup is running with root privileges at
the time the logfile is created, it is possible for local users to
create or overwrite arbitrary files on the system.

Exploit information involving this vulnerability has been made
publicly available.

II. Impact

Anyone with access to an account on the system can create or overwrite
arbitrary files on the system. With this leverage, they can ultimately
gain root privileges.

III. Solution

Patch information for this vulnerability is available
in SGI"s Security Advisory 19970101-02-PX, available at

http://www.sgi.com/Support/Secur/security.html/

- -----------------------------------------------------------------------------
This advisory is a collaborative effort between AUSCERT and the CERT
Coordination Center.

The CERT Coordination Center acknowledges Yuri Volobuev for reporting the
original problem, and Silicon Graphics, Inc. for their strong support in the
development of the advisory.
- -----------------------------------------------------------------------------

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see ftp://info.cert.org/pub/FIRST/first-contacts).


CERT/CC Contact Information
- ----------------------------
Email cert@cert.org

Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.

Fax +1 412-268-6989

Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA

Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key

Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/

CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce

To be added to our mailing list for advisories and bulletins, send your
email address to
cert-advisory-request@cert.org

- ------------------------------------------------------------------------------

Copyright 1997 Carnegie Mellon University. Conditions for use, disclaimers,
and sponsorship information can be found in
http://www.cert.org/legal_stuff.html and ftp://ftp.cert.org/pub/legal_stuff .
If you do not have FTP or web access, send mail to cert@cert.org with
"copyright" in the subject line.

CERT is registered in the U.S. Patent and Trademark Office.

- ---------------------------------------------------------------------------

This file: ftp://info.cert.org/pub/cert_advisories/CA-97.03.csetup
http://www.cert.org
click on "CERT Advisories"

========================================================================
UPDATES

Vendor Information

Below is information we have received from vendors. If you do not see your
vendor's name below, contact the vendor directly for information.

Data General
- ------------

DG/UX does not support csetup and therefore is not vulnerable.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history

Dec. 15, 1997 Added vendor information for Data General to UPDATES.
Sep. 26, 1997 Updated copyright statement
May 8, 1997 Updated the Solution section to include URL for SGI patch
information.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNJWy2HVP+x0t4w7BAQGOSgP+NJHc8VzQFL85YZ1DQ86Nj22z0yg5zScF
U8xLq3J9mmfPAPC84B4/eEy2HpAfpSt6g0pIBosx9lTaJZFCzNPMp0h8IsnNNEza
WNobYKhTi8aL7XhH+zhLVf57CJZ083DydR0svxCRo4cD1Vt2cSKrTe5PWL7Tf3HF
7I800dPU7Jk=
=VokV
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close