exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

b-01.ciac-next-os

b-01.ciac-next-os
Posted Sep 23, 1999

b-01.ciac-next-os

SHA-256 | 24642cf0029594183e9742c605ab8948fa2bf6179d4e9a2e6be1d0b6dbf23613

b-01.ciac-next-os

Change Mirror Download

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Informational Bulletin

Security Problem on the NeXT Operating System

October 5, 1990, 0800 PST Number B-1

CIAC has been informed of a series of security problems in the NeXT
operating system that are now becoming well known. If your site
operates NeXT machines, CIAC recommends that you follow the procedures
below to secure these systems against attack. The information
contained in this message has been provided by David Besemer, NeXT
Computer, Inc. and from the Computer Emergency Response Team (CERT).
The following describes four potential security problems and NeXT
Computer's recommended solutions and known system impact.

Problem 1. DESCRIPTION: On Release 1.0 and 1.0a, a script exists in
/usr/etc/restore0.9 that is a setuid shell script. The existence of
this script is a potential security problem.

IMPACT: The script is only needed during the installation process and
isn't needed for normal usage. It is possible for any logged in user
to gain root access.

SOLUTION: NeXT owners running Release 1.0 or 1.0a should remove the
file /usr/etc/restore0.9 from all disks. This file is installed by the
"BuildDisk" application, so it should be removed from all systems built
with the standard release disk, as well as from the standard release
disk itself (which will prevent the file from being installed on
systems built with the standard release disk in the future). You must
be root to remove this script, and the command that will remove the
script is the following:

# /bin/rm /usr/etc/restore0.9

Problem 2.
DESCRIPTION: On NeXT computers running Release 1.0 or 1.0a that also
have publicly accessible printers, users can gain extra permissions
via a combination of bugs.

IMPACT: Computer intruders are able to exploit this security problem to
gain access to the system. Intruders, local users and remote users are
able to gain root access.

SOLUTION: NeXT computer owners running Release 1.0 or 1.0a should do
two things to fix a potential security problem. First, the binary
/usr/lib/NextPrinter/npd must be replaced with a more secure version.
This more secure version of npd is available through your NeXT support
center. You may contact this support center using electronic mail to:
ask_next@NeXT.com. This patched npd is also available by anonymous FTP
on the nodes nova.cc.purdue.edu, umd5.umd.edu, and cs.orst.edu. You
may also contact CIAC for help in obtaining this patch. Upon receiving
a copy of the more secure npd, you must become root and install it in
place of the old one in /usr/lib/NextPrinter/npd. The new npd binary
needs to be installed with the same permission bits (6755) and owner
(root) as the old npd binary. The commands to install the new npd
binary are the following:

# /bin/mv /usr/lib/NextPrinter/npd /usr/lib/NextPrinter/npd.old
# /bin/mv newnpd /usr/lib/NextPrinter/npd

(In the above command, "newnpd" is the npd binary that you obtained
from your NeXT support center.)

# /etc/chown root /usr/lib/NextPrinter/npd
# /etc/chmod 6755 /usr/lib/NextPrinter/npd
# /etc/chmod 440 /usr/lib/NextPrinter/npd.old

The second half of the fix to this potential problem is to change the
permissions of directories on the system that are currently owned and
able to be written by group "wheel". The command that will remove
write permission for directories owned and writable by group "wheel" is
below. This command is all one line, and should be run as root.

# find / -group wheel ! -type l -perm -20 ! -perm -2 -ls -exec chmod
g-w {} \; -o -fstype nfs -prune


Problem 3.
DESCRIPTION: On NeXT computers running any release of the system
software, public access to the window server may be a potential
security problem.The default in Release 1.0 or 1.0a is correctly set so
that public access to the window server is not available. It is
possible, when upgrading from a prior release, that the old
configuration files will be reused. These old configuration files
could possibly enable public access to the window server.

IMPACT: This security problem will enable an intruder to gain access to
the system.

SOLUTION: If public access isn't needed, it should be disabled.

1. Launch the Preferences application, which is located in /NextApps 2.
Select the UNIX panel by pressing the button with the UNIX certificate
on it.

3. If the box next to Public Window Server contains a check, click on
the box to remove the check.

Problem 4.
DESCRIPTION: On NeXT computers running any release of the system
software, the "BuildDisk" application is executable by all users.

IMPACT: Allows a user to gain root access.

SOLUTION: Change the permissions on the "BuildDisk" application
allowing only root to execute it. This can be accomplished with the
command:

# chmod 4700 /NextApps/BuildDisk

To remove "BuildDisk" from the default icon dock for new users, do the
following:

1. Create a new user account using the UserManager application.
2. Log into the machine as that new user.
3. Remove the BuildDisk application from the Application Dock by
dragging it out.
4. Log out of the new account and log back in as root.
5. Copy the file in ~newuser/.NeXT/.dock to

/usr/template/user/.NeXT/.dock

(where ~newuser is the home directory of the new user account)

6. Set the protections appropriately using the following command:

# chmod 555 /usr/template/user/.NeXT/.dock

7. If you wish, with UserManager, remove the user account that you
created in step 1.

In release 2.0, the BuildDisk application will prompt for the root
password if it is run by a normal user.

NeXT has also reported that these potential problems have been fixed in
NeXT's Release 2.0, which will be available in November, 1990. For
additional information or assistance, please contact CIAC or your NeXT
support center.

Tom Longstaff
(415) 423-4416 or (FTS) 543-4416
or
David Brown
(415) 423-9878 or (FTS) 543-9878

FAX: (415) 423-0913 or (FTS) 543-0913

or send e-mail to:

ciac@tiger.llnl.gov

Thanks to Corey Satten and Scott Dickson for discovering, documenting,
and helping resolve these problems.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close