what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

a-24.ciac-unisys-passwd

a-24.ciac-unisys-passwd
Posted Sep 23, 1999

a-24.ciac-unisys-passwd

SHA-256 | c865f0709685649061c0c980ab6824ffcfb0526135dc69c642adade051fa912d

a-24.ciac-unisys-passwd

Change Mirror Download

FOR OFFICIAL DOE USE ONLY--DO NOT DISTRIBUTE OUTSIDE OF DOE
________________________________________________________________________
THE COMPUTER INCIDENT ADVISORY CAPABILITY

CIAC

ADVISORY NOTICE
________________________________________________________________________

Password Problems with Unisys U5000 /etc/passwd


May 8, 1990, 1500 PST Number A-24


The following advisory was issued by the Computer Emergency Response Team (CERT)
and has been relayed via the Defense Communications Agency's Security
Coordination Center and the various Emergency Response Teams in the Department
of Defense. This unedited notice is reproduced below.

CERT Advisory
May 7, 1990
Unisys U5000 /etc/passwd problem


The CERT/CC has recently verified several reports of unauthorized access
to Internet connected Unisys systems. The intruder(s) gained access to
these systems by logging into vendor supplied default accounts; accounts
that had not been given passwords by the systems' owners.

Gary Garb, Corporate Computer Security Officer for Unisys Corporation,
states:

"The Unisys U5000 series UNIX systems are delivered with a number of
system logins. The logins are NOT password protected when the
customer receives the system. Unless the customer secures these logins,
the system is vulnerable to unauthorized access."

"A complete list of these logins can be found in the /etc/passwd file.
Each login is described by one record in /etc/passwd which contains a
number of fields separated by colons. The second field normally would
contain the encrypted password. The system logins will initially have
a null second field (indicated by two adjacent colons) in their descriptive
records in /etc/passwd."

"The U5000/80/85/90/95 System V Administration Guide, Volume 1 (UP13679)
begins with a chapter on "System Identification and Security". On page 1-2
it states, "All logins should have passwords ... Logins that are not needed
should be either removed (by deleting from /etc/passwd) or blocked (by
locking the login as described in the section "Locking Unused Logins" on
page 1-8). The Guide contains complete instructions on controlling logins
and passwords."

"It is the user's (system administrator's) responsibility to thoroughly
read the Guide and to ensure the security of the system. *Securing the
login entries should be of the highest priority and should be accomplished
before anyone else has access to the system.*"

The CERT/CC urges administrators of Unisys systems, as well as administrators
of systems provided by other vendors, to check their systems and insure all
accounts are protected by passwords; passwords that are different from the
default passwords provided by the vendor.

Questions regarding the security aspects of Unisys systems should be directed
to:
Gary Garb, Corporate Security Officer
Unisys Corporation
(215) 986-4038

For additional information or assistance, please contact CIAC:
David S. Brown
(415) 423-9878 or (FTS) 543-9878
FAX: (415) 294-5054, (415) 423-0913 or (415) 422-4294

CIAC's 24-hour emergency hot-line number is (415) 971-9384.

FELIX, CIAC's bulletin board service (BBS) can be accessed at 1200 or 2400 baud
at (415) 423-4753 or (FTS) 543-4753. (9600 baud access can be obtained from
Lawrence Berkeley and Lawrence Livermore Laboratories at 423-9885.)

Neither the United States Government nor the University of California nor any of
their employees, makes any warranty, expressed or implied, or assumes any legal
liability or responsibility for the accuracy, completeness, or usefulness of any
information, product, or process disclosed, or represents that its use would not
infringe privately owned rights. Reference herein to any specific commercial
products, process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor the
University of California, and shall not be used for advertising or product
endorsement purposes.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close