exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

b-27.ciac-sunsrc-setuid-installation-prob

b-27.ciac-sunsrc-setuid-installation-prob
Posted Sep 23, 1999

b-27.ciac-sunsrc-setuid-installation-prob

SHA-256 | dd28c1017ae9a963fbbdd7d9cc8156670a424bc72e52fca050ab558766441a8a

b-27.ciac-sunsrc-setuid-installation-prob

Change Mirror Download
        _____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

May 16, 1991, 1500 PST Number B-27

sunsrc setuid Installation Problem
_________________________________________________________________________
PROBLEM: Setuid security problem resulting from installing sunsrc
PLATFORM: SunOS systems in which Sun Source tapes have been installed
DAMAGE: May allow unauthorized root access
SOLUTIONS: Modify permissions for /usr/release/bin/ and/or edit the
makefile in sunsrc/release and change SETUID definition
_________________________________________________________________________
Critical Facts about sunsrc setuid Installation Problem

Sun Microsystems has recently released a security bulletin (#00107)
describing a problem resulting from installing sunrc (distribution of
sources). It is important to note that this problem affects only SunOS
systems that have installed Sun Source tapes. A directory,
/usr/release/bin, is created when sunsrc is installed. Two binary
files, makeinstall and winstall, are then installed in this directory.
Both of these files are setuid root. Because these files exec other
programs, "make -k install" (makeinstall) and "install" (winstall), an
unauthorized user may become root. The Sun Bug ID is 1059621.

To fix this problem, Sun Microsystems recommends that you follow
both of the following procedures as root:

1. If the sources have already been installed, use the command:

chmod ug-s /usr/release/bin/{makeinstall, winstall}

to reset setuid bits in makeinstall and winstall.

2. Remove the makeinstall and winstall entries from the SETUID
definition in sunsrc/release/makefile. This will insure that new
setuid programs called makeinstall and winstall will not be
re-installed inadvertently the next time root does a make(1). The
line in the makefile should be changed from

SETUID=makeinstall unmount winstall .mountit

to

SETUID=unmount .mountit

For additional information or assistance, please contact CIAC:

Eugene Schultz
(415) 422-7781 or (FTS) 532-7781
gschultz@cheetah.llnl.gov

Call CIAC at (415) 422-8193 or (FTS) 532-8193 or send e-mail
to ciac@cheetah.llnl.gov.

Send FAX messages to: (415) 423-0913 or (FTS) 543-0913.

Sun Microsystems provided some of the information used in this
bulletin. This document was prepared as an account of work sponsored
by an agency of the United States Government. Neither the United States
Government nor the University of California nor any of their employees,
makes any warranty, express or implied, or assumes any legal liability
or responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights. Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation or favoring by the
United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government or the University of
California, and shall not be used for advertising or product
endorsement purposes.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close