exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

VB-96.16.transarc

VB-96.16.transarc
Posted Sep 14, 1999

Information from Transarc Corp. about a problem with a Solaris AS Integrated login bug if the user is in too many groups.

systems | solaris
SHA-256 | 4e51e509cebe46b1cf5df339ee0d89e00bb2d2fc02b7fa84ac5d7c956f8d32ca

VB-96.16.transarc

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
CERT(sm) Vendor-Initiated Bulletin VB-96.16
September 17, 1996

Topic: Solaris AFS/DFS Integrated login bug if user is in too many groups
Source: Transarc Corp.

To aid in the wide distribution of essential security information, the CERT
Coordination Center is forwarding the following information from Transarc
Corp. Transarc urges you to act on this information as soon as
possible. Transarc contact information is included in the forwarded text
below; please contact them if you have any questions or need further
information.


=======================FORWARDED TEXT STARTS HERE============================

- ----------------------------------------------------------------------

Topic: Solaris AFS/DFS Integrated login bug if user is in too many
groups
Source: Transarc Corp.
- --------------------------------


Problem: Vulnerability in Transarc DCE Integrated login for sites
running DFS


I. Description

On systems running the DCE Distributed File System (DFS), users placed
in more than NGROUPS_MAX-1 (usually 15) groups in the DCE registry and
in /etc/group will have an incorrect grouplist upon login.

For systems running both AFS and DFS, this limit is reduced to
NGROUPS_MAX-3 (13).

The vulnerability is caused by a change in the setgroups(2) system
call under DFS, which can cause it to fail when passed a large set of
supplementary groups. Thus, it can cause problems in
non-Transarc-supplied programs which use setgroups(2) if they do not
handle error conditions correctly.

Vulnerable products include Transarc DCE and DFS 1.1 for Solaris 2.4
and Solaris 2.5. This vulnerability is not present on sites not
running DFS (even if they are running AFS).


II. Impact

Users with accounts on the system may gain unauthorized access to
resources. Access to resources controlled by DCE/DFS is unaffected,
as the DCE PAC is correct.

Users without accounts on the system cannot take advantage of this
vulnerability.


III. Solution

The following patches are available from Transarc:
DCE/DFS 1.1 for Solaris 2.4: patch 22
DCE/DFS 1.1 for Solaris 2.5: patch 2


A workaround is possible as well: simply ensure that no user is listed
in more than NGROUPS_MAX-3 groups in /etc/group (including the user's
primary group, which may not appear in /etc/group). With this
workaround, only the primary group and groups which appear in
/etc/group will appear in the grouplist upon login.

Contact Transarc customer support by telephone at 412-281-5852 or
via email (dfs-help@transarc.com) for additional information or
questions.

IV. Other Platform Impact

HP has advised that this problem does not affect the HP product.
IBM has advised that this problem does not affect the IBM product.



========================FORWARDED TEXT ENDS HERE=============================

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (FIRST).

We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact
the CERT staff for more information.

Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key


CERT Contact Information
- ------------------------
Email cert@cert.org

Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST
(GMT-5)/EDT(GMT-4), and are on call for
emergencies during other hours.

Fax +1 412-268-6989

Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA

CERT publications, information about FIRST representatives, and other
security-related information are available from
http://www.cert.org/
ftp://info.cert.org/pub/

CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce

To be added to our mailing list for CERT advisories and bulletins, send your
email address to
cert-advisory-request@cert.org


CERT is a service mark of Carnegie Mellon University.

This file: ftp://info.cert.org/pub/cert_bulletins/VB-96.16.transarc



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMj7JiHVP+x0t4w7BAQEljgP/RHRL2ifIJQjMnaAfMis62pysC8PPzJ/n
SZzGlbKiKf765nS2yLi8IZFuVyRMibGCXj07TAxtQwtJuJbPA33+J2Qcvsucvx1b
R88z6P9HhBZqfrPKMnCmvxPa1FNUFMRkmQy37xg9wfZbeZkhjjU+c05uP2pgP/Or
pDS2H+AJXLY=
=chOF
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close