what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

c-10.ciac-openwindows-v3

c-10.ciac-openwindows-v3
Posted Sep 23, 1999

c-10.ciac-openwindows-v3

SHA-256 | 5616c81af420b4dca1ba6bcf35882307e0d75656ad1de46884fd6be6a610a6ba

c-10.ciac-openwindows-v3

Change Mirror Download

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

New patch for OpenWindows V.3 available for SunOS systems

December 12 1630 PST 1991 Number C-10
_________________________________________________________________________
PROBLEM: A vulnerability in OpenWindows V.3 can be exploited to gain
unauthorized root access.
PLATFORM: OpenWindows, version 3
DAMAGE: Allows unauthorized root access with unrestricted access to the
system
SOLUTION: Apply Sun Patch ID: 100448-01 available from Sun or ftp.uu.net
_________________________________________________________________________
Critical Facts about OpenWindows V.3 patch

CIAC has learned from Sun Microsystems Inc. that it has a security
vulnerability in its OpenWindows V 3.0 product that should be
corrected immediately. CIAC advises that you replace the exploitable
executable file with the patch described below. Please note that Sun
only supports this product on sun4 and sun4c architectures running
SunOS 4.1.1. The product is not available for sun3 architectures.

The README file included with the patch has specific installation
instructions that should read and understand before you attempt
installation.

Below is an excerpt from an alert distributed by SUN providing
additional information on this patch.
--------------------------------------------------------------------------
Sun Bug ID : 1076118
Sun Patch ID: 100448-01
Checksum of compressed tarfile 100448-01.tar.Z on ftp.uu.net = 04354 5

Sun advises that you replace the exploitable executable file with
the appropriate replacement provided in the patch. Please refer to
the patch's README file for more information.

All patches listed are available through local Sun answer centers
worldwide as well as through anonymous ftp: in the US, ftp to ftp.uu.net
and obtain the patch from the ~ftp/sun-dist directory; in Europe, ftp to
mcsun.eu.net and obtain the patch from the ~ftp/sun/fixes
directory. Please refer to the BugID and PatchID when requesting
patches from Sun answer centers.
--------------------------------------------------------------------------


For additional information or assistance, please contact CIAC:

David Brown
(510)423-9878** or (FTS) 543-9878
(FAX) (510) 423-8002** or (FTS) 543-8002
dsbrown@llnl.gov

Send e-mail to ciac@llnl.gov or call CIAC at

(510) 422-8193**/(FTS)532-8193.

**Note area code has changed from 415, although the 415 area code will
work until Jan. 1992.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response team,
DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
agency's team will coordinate with CIAC.

CIAC would like to thank Ken Pon at Sun Microsystems for providing
some of the information described in this bulletin. Neither the
United States Government nor the University of California nor any of
their employees, makes any warranty, expressed or implied, or assumes
any legal liability or responsibility for the accuracy, completeness,
or usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close