what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ISS Security Advisory April 26, 2000

ISS Security Advisory April 26, 2000
Posted Apr 26, 2000
Site xforce.iss.net

Internet Security Systems (ISS) X-Force has discovered a vulnerability in the AIX frcactrl program. The Fast Response Cache Accelerator (FRCA) is a kernel module that can be used with the IBM HTTP server to improve the performance of a web server. If the FRCA module is loaded, a local attacker could use frcactrl, a program used to manage FRCA configuration, to modify files.

tags | web, kernel, local, root
systems | aix
SHA-256 | 4c52418fd006161d9742422a2bf61974cc7390397b5bdafb2ad32a6aba05f961

ISS Security Advisory April 26, 2000

Change Mirror Download

TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to
majordomo@iss.net Contact alert-owner@iss.net for help with any problems!
---------------------------------------------------------------------------

-----BEGIN PGP SIGNED MESSAGE-----

ISS Security Advisory
April 26, 2000

Insecure file handling in IBM AIX frcactrl program

Synopsis:

Internet Security Systems (ISS) X-Force has discovered a vulnerability in
the AIX frcactrl program. The Fast Response Cache Accelerator (FRCA) is a
kernel module that can be used with the IBM HTTP server to improve the
performance of a web server. If the FRCA module is loaded, a local attacker
could use frcactrl, a program used to manage FRCA configuration, to modify
files.

Impact:

An attacker could gain root privileges by using the frcactrl program if the
FRCA kernel module is loaded.

Affected Versions:

The frcactrl command shipped with AIX 4.3 APAR IY02669 is vulnerable.

Description:

The AIX Fast Response Cache Accelerator (FRCA) is a kernel extension module
that improves the performance of a web server by using a memory cache to
store data being served from the web server. FRCA is used primarily with the
Apache-based IBM HTTP server, but it may also be used with other web
servers. The frcactrl program is used to manage the FRCA configuration and
is distributed as part of the base operating system in AIX 4.3. The
vulnerability is present on systems with AIX fix IY02669 applied and with
the FRCA kernel extension loaded (the kernel extension is not enabled by
default). The setuid bit of the frcactrl file is turned on by APAR
(Authorized Problem Analysis Report) IY02669, which allows non-root users to
configure the module. A malicious user may use frcactrl to manipulate the
configuration of the FRCA log files to create, append, or overwrite files as
root.

Recommendations:

ISS recommends that if FRCA is not needed, the module can be unloaded with
the following command:
# /usr/sbin/frcactrl unload ; /usr/sbin/slibclean

Until an official fix is available, IBM recommends removing the setuid bit
from the frcactrl command:
# chmod 555 /usr/sbin/frcactrl

IBM is currently working on the following APARs, which will be available
soon:
APAR 4.3.x: IY09514

APARs may be ordered using Electronic Fix Distribution (via FixDist) or from
the IBM Support Center. For more information on Fix Distribution go to:
http://service.software.ibm.com/support/rs6000 or send an email to
aixserv@austin.ibm.com with a subject of "FixDist".

Additional Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CAN-2000-0249 to this issue. This is a candidate for inclusion in the CVE
list (http://cve.mitre.org), which standardizes names for security problems.

Credits:

This vulnerability was discovered and researched by Oliver Atoa-Ortiz of the
ISS X-Force. ISS would like to thank IBM for their response and handling of
this vulnerability.

_____

About Internet Security Systems (ISS)
ISS is a leading global provider of security management solutions for
e-business. By offering best-of-breed SAFEsuite (tm) security software,
industry-leading ePatrol (tm) managed security services, and strategic
consulting and education services, ISS is a trusted security provider to its
customers, protecting digital assets and ensuring the availability,
confidentiality and integrity of computer systems and information critical
to e-business success. ISS' lifecycle e-business security management
solutions protect more than 5,000 customers including 21 of the 25 largest
U.S. commercial banks, 9 of the 10 largest telecommunications companies and
over 35 government agencies. Founded in 1994, ISS is headquartered in
Atlanta, GA, with additional offices throughout North America and
international operations in Asia, Australia, Europe, Latin America and the
Middle East. For more information, visit the ISS Web site at www.iss.net or
call 888-901-7477.

Copyright (c) 2000 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert
electronically. It is not to be edited in any way without express consent of
the X-Force. If you wish to reprint the whole or any part of this Alert in
any other medium excluding electronic medium, please e-mail xforce@iss.net
for permission.

Disclaimer

The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at the
user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php3 as well
as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force (xforce@iss.net)
of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOQcnEDRfJiV99eG9AQGu+wP/UpKWzpOqg+u8DEy2e+4OS+hNieSEaFXg
FhSupLuxlutQKZlKdNDI91OKnKxLG977QkpQzCkZvWRIwYooLsL0Jm/UH9ZDdKyo
nneRdnyec48fYgH1ur0IiVdUEsHdFNSYyOGa9UZHVj5bCsrAqtcARtAUsrTTfhRd
kFMKRMnr/js=
=1p6Q
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close