what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

c-08.ciac-sunrdist

c-08.ciac-sunrdist
Posted Sep 23, 1999

c-08.ciac-sunrdist

SHA-256 | ae8bafeb9a705d8fe2b8301855baa5a67072cc2c49b39d99b141c0474169e88d

c-08.ciac-sunrdist

Change Mirror Download

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

New patch #100383-03 available for /usr/ucb/rdist on SunOS systems

November 22, 1991, 1200 PST Number C-8

_________________________________________________________________________
PROBLEM: A new bug discovered in /usr/ucb/rdist may allow users to
gain root privilege
PLATFORM: All supported Sun architectures and operating system versions
DAMAGE: Allows unauthorized root access with unrestricted access to the
system
SOLUTION: Apply patch 100383-03 available from Sun or ftp.uu.net
_________________________________________________________________________
Critical Facts about /usr/ucb/rdist patch

Sun Microsystems has recently released a security bulletin #00113
describing a new patch available for SunOS systems. This patch closes
a vulnerability in the /usr/ucb/rdist program that could allow an
intruder to gain root access to the system by creating a setuid root
shell.

This patch, and all others Sun patches are available through your
local Sun answer centers worldwide as well as through anonymous ftp:
in the US, ftp to ftp.uu.net and obtain the patch from the
~ftp/sun-dist directory; in Europe, ftp to mcsun.eu.net and obtain the
patch from the ~ftp/sun/fixes directory. The patch must be retrieved
in binary mode, then uncompressed at the local system. The checksum
of compressed tarfile 100383-03.tar.Z on ftp.uu.net is 50273 163.
This patch file includes new versions of the /usr/ucb/rdist program
for SunOS 4.1.1, 4.1, and 4.0.3 for all supported hardware platforms.

To install the patch on your system, follow the instructions available
in the README file which accompanies the patch files. If you do not
use the rdist command on your system, Sun recommends that you change
the permissions of the /usr/ucb/rdist file using the following command
(as root):

chmod 0100 /usr/ucb/rdist

For additional information or assistance, please contact CIAC:

David Brown
(510)423-9878** or (FTS) 543-9878
(FAX) (510) 423-8002** or (FTS) 543-8002
dsbrown@llnl.gov

Send e-mail to ciac@llnl.gov or call CIAC at

(510) 422-8193**/(FTS)532-8193.

**Note area code has changed from 415, although the 415 area code will
work until Jan. 1992.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response team,
DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
agency's team will coordinate with CIAC.

CIAC would like to thank Ken Pon at Sun Microsystems for providing
some of the information described in this bulletin. Neither the
United States Government nor the University of California nor any of
their employees, makes any warranty, expressed or implied, or assumes
any legal liability or responsibility for the accuracy, completeness,
or usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close