Subject AIX/ESA v2.2 mail queue spooling directory Date 28-Feb-94
fcbacfa0a066758294e762226e8d67758759240366eb68d448abf4d68ac52dc9
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===============================================================================
>> CERT-NL, 01-Mar-2000 <<
>> All CERT-NL information has been moved to http://cert.surfnet.nl. Links <<
>> to CERT-NL information contained in this advisory are therefore outdated. <<
>> <<
>> CERT-NL also has stopped the CERT-CC-Mirror service. Due to this the <<
>> links to the CERT-CC mirror are obsolete. Visit the CERT-CC site for the <<
>> complete CERT-CC advisory texts: http://www.cert.org <<
===============================================================================
===============================================================================
Security Advisory CERT-NL
===============================================================================
Author/Source : CERT-NL (teun nijssen) Index : S-94-05
Distribution : World Page : 1
Classification: External Version: Final
Subject : AIX/ESA v2.2 mail queue spooling directory Date : 28-Feb-94
===============================================================================
CERT-NL has received information concerning the default setting of the
mail queue spooling directory in AIX/ESA v2.2 systems. By changing this
default, the vulnerability can be removed.
This vulnerability has only been reported to be present in AIX/ESA v2.2.
- -----------------------------------------------------------------------------
I. Description
The mail queue spooling directory (/var/spool/mqueue) in
AIX/ESA v2.2 systems has mode 1777 (world writable) as default.
II. Impact
This vulnerability allows a local user to gain root access.
III. Solution
This vulnerability can be removed by changing the mode of
/var/spool/mqueue by issuing the following commands:
chgrp mail /var/spool/mqueue
chmod g+s /var/spool/mqueue
chmod o-w /var/spool/mqueue
These commands leave the mail system in working order and closes the
security hole.
- ---------------------------------------------------------------------------
CERT-NL thanks Harold van Aalderen of SARA for distributing the
necessary information and solution.
- ---------------------------------------------------------------------------
==============================================================================
CERT-NL is the Computer Emergency Response Team for SURFnet customers. SURFnet
is the Dutch network for educational, research and related institutes. CERT-NL
is a member of the Forum of Incident Response and Security Teams (FIRST).
All CERT-NL material is available under:
http://cert.surfnet.nl/
In case of computer or network security problems please contact your local
CERT/security-team or CERT-NL (if your institute is NOT a SURFnet customer
please address the appropriate (local) CERT/security-team).
CERT-NL is one/two hour(s) ahead of UTC (GMT) in winter/summer,
i.e. UTC+0100 in winter and UTC+0200 in summer (DST).
Email: cert-nl@surfnet.nl ATTENDED REGULARLY ALL DAYS
Phone: +31 302 305 305 BUSINESS HOURS ONLY
Fax: +31 302 305 329 BUSINESS HOURS ONLY
Snailmail: SURFnet bv
Attn. CERT-NL
P.O. Box 19035
NL - 3501 DA UTRECHT
The Netherlands
NOODGEVALLEN: 06 22 92 35 64 ALTIJD BEREIKBAAR
EMERGENCIES : +31 6 22 92 35 64 ATTENDED AT ALL TIMES
CERT-NL'S EMERGENCY PHONENUMBER IS ONLY TO BE USED IN CASE OF EMERGENCIES:
THE SURFNET HELPDESK OPERATING THE EMERGENCY NUMBER HAS A *FIXED*
PROCEDURE FOR DEALING WITH YOUR ALERT AND WILL IN REGULAR CASES RELAY IT
TO CERT-NL IN AN APPROPRIATE MANNER. CERT-NL WILL THEN CONTACT YOU.
===============================================================================
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.1i
iQA/AwUBOL6WEDSYjBqwfc9jEQK+CwCaAwm0ZQg2JnvlGGriJngDZ+J5o7QAn28G
b94vX6k+UjNPigPtO3gLetMW
=kh4K
-----END PGP SIGNATURE-----