what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

assist.422

assist.422
Posted Sep 23, 1999

assist.422

SHA-256 | 5d04c7d392a1080a3b9e8c5d8ae6209916766c1d63124ad00ddc6068bc25ec04

assist.422

Change Mirror Download
-----BEGIN PRIVACY-ENHANCED MESSAGE-----
Proc-Type: 4,MIC-CLEAR
Content-Domain: RFC822
Originator-Certificate: MIICozCCAgwCAREwDQYJKoZIhvcNAQECBQAwgYYxC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Issuer-Certificate: MIICNTCCAZ4CASIwDQYJKoZIhvcNAQECBQAwRDELMAkGA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Issuer-Certificate: MIIB8jCCAVsCAQEwDQYJKoZIhvcNAQECBQAwRDELMAkGA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MIC-Info: RSA-MD5,RSA,VTbdZ9oA4YknexCVTJ0DI2SuEEglLjs5Dv1bNKge7zk
afygenqoh8GqGI7gddqOm3PqWThGnBTHjokukif8171U4dhrJP8DYSeS46dzcKIn
6RgxzBhIR82fkzDnZslxerT85wGfc9vNFGxx6Z+2ejYnR8zsYoKcn7Ct+f1zLxdc
=


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Automated Systems Security Incident Support Team
_____
___ ___ _____ ___ _____ | /
/\ / \ / \ | / \ | | / Integritas
/ \ \___ \___ | \___ | | < et
/____\ \ \ | \ | | \ Celeritas
/ \ \___/ \___/ __|__ \___/ | |_____\
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Bulletin 94-22

Release date: 7 June 1994 7:00 AM EDT

SUBJECT: Vulnerability in HP/UX /etc/subnetconfig

SUMMARY: A vulnerability exists in certain versions of HP/UX
subnetconfig that allow existing users on a system to increase
their privileges. These versions of subnetconfig exist on HP-UX
versions 9.0 and 9.01. They do not exist in prior versions of
HP-UX or in versions subsequent to the above (9.03, etc.).

BACKGROUND: The vulnerability is a result of an access permissions
problem, and can be eliminated by applying a patch developed by
HP. This problem affects HP 9000 Series 300, 400, 700, and 800
running HP-UX 9.0/9.01.

IMPACT: An existing user can gain root access to the system.

RECOMMENDED SOLUTION: Apply patch PHNE_3563 (series 300/400,
HP-UX 9.0), or PHNE_3564 (series 700/800, HP-UX 9.0/9.01 ONLY).
The patch can be obtained through HP SupportLine Mail Service or
local HP Response Centers.
A. HP SupportLine Mail Service

To obtain the patch, send the following in the TEXT PORTION
OF THE MESSAGE to support@support.mayfield.hp.com
(no Subject is required):

send patch_name

for example:

send PHNE_35nn

It will automatically be emailed back to you. Note that
users with an established SupportLine handle & password may also
download the patch from HP SupportLine via ftp, kermit, or uucp.
Detailed instructions for obtaining a SupportLine handle & password
can be found in ASSIST 94-14.

B. HP Response Center Support

If you need additional assistance and have a support
contract, you can contact your local Response Center for
further help.

To apply the patch to your system:
a. Become superuser (or root).
b. Put the patch into /tmp.
c. At the shell prompt, type "sh /tmp/PHNE_35nn"
d. At the shell prompt, for 9.x systems type
"/etc/update -s /tmp/PHNE_35nn.updt \*"

Note: "nn" refers to the last two digits of the appropriate
patch from the list in step 1.

Examine /tmp/update.log for any relevant WARNINGs or ERRORs.
This can be done as follows:

a. At the shell prompt, type
"tail -60 /tmp/update.log | more"
b. Page through the next three screens via the space bar,
looking for WARNING or ERROR messages.

Consequences of installing this patch

As a result of applying this patch and closing the security
hole, /etc/subnetconfig will no longer be executable by non-root
users. This is consistent with the intended use of this program;
it is intended for system administrators.

ASSIST is an element of the Defense Information Systems Agency
(DISA), Center for Information Systems Security (CISS), that
provides service to the entire DoD community. If you are a
constituent of the DoD and have any questions about ASSIST or
computer security issues, contact ASSIST using one of the methods
listed below. If your organization/institution is non-DoD,
contact your Forum of Incident Response and Security Teams
(FIRST) representative. You can obtain a list of FIRST member
organizations and their constituencies by sending email to
docserver@first.org with an empty "subject" line and a message body
containing the line "send first-contacts".

ASSIST INFORMATION RESOURCES: If you would like to be included in
the distribution list for these bulletins, send your Milnet
(Internet) e-mail address to assist-request@assist.ims.disa.mil.
Back issues of ASSIST bulletins, and other security related
information, are available from the ASSIST BBS at 703-756-7993/
1154 DSN 289, and through anonymous FTP from assist.ims.disa.mil
(IP address 137.130.234.30). Note: assist.ims.disa.mil will only
accept anonymous FTP connections from Milnet addresses that are
registered with the NIC or DNS.

ASSIST contact information:
PHONE: 800-357-4231 (or 703-756-7974 DSN 289), duty hours are 06:00
to 22:30 EDT Monday through Friday. During off duty hours, weekends
and holidays, ASSIST can be reached via pager at 800-SKY-PAGE
(800-759-7243) PIN 2133937. Your page will be answered within 30
minutes, however if a quicker response is required, prefix your
phone number with "999".
ELECTRONIC MAIL: Send to assist@assist.ims.disa.mil.
ASSIST BBS: Leave a message for the "sysop".

Privacy Enhanced Mail (PEM): ASSIST uses PEM, a public key
encryption tool, to digitally sign all bulletins that are
distributed through e-mail. The section of seemingly random
characters between the "BEGIN PRIVACY-ENHANCED MESSAGE" and
"BEGIN ASSIST BULLETIN" contains machine-readable digital
signature information generated by PEM, not corrupted data. PEM
software for UNIX systems is available from Trusted Information
Systems (TIS) at no cost, and can be obtained via anonymous FTP
from ftp.tis.com (IP 192.94.214.96). Note: The TIS software is
just one of several implementations of PEM currently available and
additional versions are likely to be offered from other
sources in the near future.

Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does
not constitute or imply its endorsement, recommendation, or
favoring by ASSIST. The views and opinions of authors expressed
herein shall not be used for adverstising or product endorsement
purposes.

-----END PRIVACY-ENHANCED MESSAGE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close