exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

c-20.ciac-sgi-pseudo-tty

c-20.ciac-sgi-pseudo-tty
Posted Sep 23, 1999

c-20.ciac-sgi-pseudo-tty

SHA-256 | 40c381f32e0deaac665497916b337a91bcd65e912290c4bab826682acc02edf6

c-20.ciac-sgi-pseudo-tty

Change Mirror Download
     DISTRIBUTION RESTRICTIONS:  PUBLIC DISTRIBUTION
__________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

SGI 3.3.X Pseudo-tty Vulnerability

March 6, 1992 1000 PST Number C-20
_________________________________________________________________________

PROBLEM: Non-root users have the ability to see the output of other
users terminal activity.
PLATFORM: Silicon Graphics systems running IRIX 3.3.X (3.3.1, 3.3.2 and 3.3.3L)
DAMAGE: Potential disclosure of user sensitive data including passwords.
SOLUTION: SGI MIPS based machines should upgrade to 4.0.1 or to Trusted
Irix.
__________________________________________________________________________
Critical Facts about SGI 3.3.X Pseudo tty Vulnerability

CIAC has become aware of a possible security problem with Silicon
Graphics systems running IRIX 3.3.X (3.3.1, 3.3.2 and 3.3.3L). This
problem has been fixed under 4.0.1.

The IRIX psuedo-ttys (pttys) are protected mode 0666, which permits
non-root users to read unprotected terminals. This might permit non-
authorized users to see confidential information, including passwords.

SGI and CIAC recommend that you upgrade your 3.3.X system either to
4.0.1 or to Trusted Irix immediately. Contact your SGI
representative, or SGI Express (1-800-800-SGI1). SGI customers under
support may call 1-800-800-4744 (1-800-800-4SGI)

Note, if you suspect that another user is reading from your terminal,
you may use the command: fuser -u `tty`. This shows what processes
are connected to your tty, see fuser(8). You should be able to
account for each of them using the ps(1) command.

For additional information or assistance, please contact CIAC:

David Brown
(510) 423-9878/(FTS) 543-9878
dsbrown@llnl.gov

Call CIAC at (510) 422-8193/(FTS) 532-8193 or send e-mail to
ciac@llnl.gov. FAX messages to: (510) 423-8002/(FTS) 543-8002.

Previous CIAC bulletins and other information is available via
anonymous ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
agency's team will coordinate with CIAC.

CIAC would like to thank Lisa Amedeo of Fermi National Laboratory, and
Debby Derby of Silicon Graphics Inc. for their assistance with this
bulletin.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close