what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

a-32.ciac-sunview-suntools

a-32.ciac-sunview-suntools
Posted Sep 23, 1999

a-32.ciac-sunview-suntools

SHA-256 | 129a85dab13128cfdaa7927556dd1bffb72980609893e56c90c44992cb6386e1

a-32.ciac-sunview-suntools

Change Mirror Download

________________________________________________________________________
THE COMPUTER INCIDENT ADVISORY CAPABILITY

CIAC

INFORMATION BULLETIN
________________________________________________________________________

SunView/SunTools selection_svc Vulnerability

August 23, 1990, 1600 PST Number A-32

CIAC has been advised that there is a vulnerability (Sun Bug ID
1039576) in systems running SunView under SunOS 4.x (or SunTools under
SunOS 3.x). The SunView/SunTools selection_svc facility may allow a
remote user unauthorized access to selected files from a computer
running SunView. The problem exists in Sun3 and Sun4 platforms
running SunOS 3.x, 4.0, 4.0.1, 4.0.3, and 4.1 as well as 386i platforms
running SunOS 4.0, 4.01, and 4.0.2. Because the selection_svc process
continues to run until terminated, this vulnerability can be exploited
even after a user changes to another window system after running
SunView/SunTools or logs off the system. (The problem is in
SunView/SunTools, however, and not with other window systems such as
X11.) CERT/CC provides additional details:

On Sun3 and Sun4 systems, a remote system can read any file that is
readable to the user running SunView. On the 386i, a remote system
can read any file on the workstation running SunView regardless of
protections. Note that if root runs Sunview, all files are
potentially accessible by a remote system. If the password file with
the encrypted passwords is world readable, an intruder can take the
password file and attempt to guess passwords.

A patch for this vulnerability is available for Sun 4.x systems. Call
your local Sun answer center, phone (800) USA-4SUN, anonymous ftp into
sun-fixes on uunet.uu.net, or send e-mail to:

security-features@sun.com

Sun Microsystems has recently established a customer warning system for
reporting new vulnerabilities and disseminating relevant information.
Send e-mail to:

security-alert@sun.com

or leave a message on the voice mail system at (415) 336-7205. Please
also advise CIAC of any new vulnerabilities you may discover.

For additional information or assistance, please contact CIAC:

David Brown
(415) 423-9878 or (FTS) 543-9878
FAX: (415) 423-0913, (FTS) 543-0913 or (415) 422-4294

CIAC's 24-hour emergency hot-line number is (415) 971-9384. If you
call the emergency number and there is no answer, please let the number
ring until voice mail comes on. Please leave a voice mail message;
someone will return your call promptly. You may send e-mail to:

ciac@tiger.llnl.gov

CERT/CC and Brad Powell of Sun Microsystems provided information
included in this bulletin. Neither the United States Government nor
the University of California nor any of their employees, makes any
warranty, expressed or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, product, or process disclosed, or represents that its use
would not infringe privately owned rights. Reference herein to any
specific commercial products, process, or service by trade name,
trademark manufacturer, or otherwise, does not necessarily constitute
or imply its endorsement, recommendation, or favoring by the United
States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government nor the University of
California, and shall not be used for advertising or product
endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close