what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ciacfy93.txt

ciacfy93.txt
Posted Sep 23, 1999

ciacfy93.txt

SHA-256 | 2b0ba8199ce8dcaa5faeee496016136a233b74645c0887b5c7b6dfb53e93d630

ciacfy93.txt

Change Mirror Download
CIAC documents FY 1993
Series D

ciacfy93.txt All public FY93 CIAC bulletins.
d-01.txt ciac-novel-access-rights
d-02.txt ciac-(limited-distribution)
d-03.txt ciac-vms-MONITOR-patch
d-04.txt ciac-sunos-18-patches
d-05.txt ciac-hp-NIS-ypbind
d-06.txt ciac-vms-disuser
d-07.txt ciac-(limited-distribution)
d-08.txt ciac-vms-v5-OS
d-09.txt ciac-vms-v5-OS-addendum
d-10.txt ciac-november-17-virus
d-11.txt ciac-sunos-patches-dni-pcnfs
d-12.txt ciac-(limited-distribution)
d-13.txt ciac-unix-wuarchive-ftp-daemon
d-14.txt ciac-(limited-distribution)
d-15.txt ciac-cisco-router-vulnerability
d-16.txt ciac-sunos-expreserve-vulnerability
d-17.txt ciac-(limited-distribution)
d-18.txt ciac-solaris-2.x-expreserve-patches
d-19.txt ciac-anonymous-ftp-server-attacks
d-20.txt ciac-summary-sunos-patches
d-21.txt ciac-novell-netware-login-patch
d-22.txt ciac-Satan-Bug-Virus
d-23.txt ciac-limited-distribution
d-24.txt ciac-sco-home-directory-vulnerability
d-25.txt ciac-automated-scanning-of-network-vulns
d-26.txt ciac-limited-distribution
_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Novell NetWare Access Rights Vulnerability

OCT 14, 1992 0900 PDT Number D-01
________________________________________________________________________
PROBLEM: A vulnerability has been discovered which may allow any Novell
Netware user to obtain unauthorized privileges
PLATFORM: PC/MS-DOS with Novell NetWare 3.x, 2.x, and NetWare for UNIX
DAMAGE: Compromise of server integrity
SOLUTION: Obtain and apply software enhancements available from Novell;
prudent NetWare administration
________________________________________________________________________
Critical Facts about the Novell NetWare Access Rights Vulnerability

CIAC has learned of a network security threat that allows any Novell
user, equipped with a special program, to gain the access rights
assignable by any other user currently attached to the server. This
vulnerability affects NetWare 3.x, NetWare 2.x, and NetWare for Unix.

CIAC recommends that you obtain the Phase I security enhancements as
soon as they are available. They are scheduled to be released by
Novell by the end of October. NetWare 3.x and 2.x customers will be
able to obtain the enhancements via anonymous ftp from
ftp.IS.Sandy.Novell.COM (137.65.12.2) as well as via NetWire
(Compuserve) and NetWare Express (GE Information Services). NetWare
for Unix customers should contact the NetWare for Unix partner who
provided them the software. Help is available from the Novell
customer information line 1-800-NETWARE.

As a general precaution, and as an interim measure until the Phase I
patches are released, Novell recommends the following security
practices:

* Use the NetWare utility "SECURITY" to detect insecure access
points to the server.

* Require passwords on all accounts.

* Force periodic password changes.

* Require unique passwords.

* Limit access rights and security equivalences.

* Limit concurrent connections.

* Enforce login time restrictions.

* Enforce login station restrictions.

* Enable intruder detection.

* Secure unattended workstations to avoid unauthorized use.

In addition, CIAC recommends that you minimize or eliminate supervisor
activity concurrent with non-privileged connections until Phase I is
available; and further recommends that you activate all applicable
NetWare security features and install the most recent versions of
system software, client software, and other patches.

Novell informs us that to their knowledge programs to exploit this
vulnerability have not yet been found outside laboratories; and the
technique used to create the security threat, known as packet spoofing
or packet forging, is inherent to all client server architectures that
have not taken specific protective actions. CIAC believes that
because of the increasing publicity of this technique, the
vulnerability could soon be exploited by the hacker/cracker community.

CIAC would like to thank Novell for providing the security practices,
access information, and general support for our efforts concerning
this issue. We would also like to acknowledge the efforts of SURFnet
Computer Emergency Response Team CERT-NL for alerting us to this
situation.

For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send e-mail to ciac@llnl.gov. FAX messages
to: (510) 423-8002 / FTS.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
agency's team will coordinate with CIAC.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.


======================================================================

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
LIMITED DISTRIBUTION BULLETIN

Internet Attack Advisory

October 23, 1992, 1500 PST Number D-02

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX messages
to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number
855-0070 (primary) or 855-0074 (secondary).

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400
baud at (510) 423-4753 and 9600 baud at (510) 423-3331.
Previous CIAC bulletins and other information is available via
anonymous ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team.
Your agency's team will coordinate with CIAC.

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
INFORMATION BULLETIN

Patch Available for VAX/VMS MONITOR Vulnerability

October 30, 1992, 0800 PST Number D-03

______________________________________________________________________________
PROBLEM: The MONITOR utility on VMS Versions 5.0 through 5.4-2 can be
used to obtain unauthorized privileges.
PLATFORM: VAX systems running the VMS operating system.
DAMAGE: An unprivileged user can obtain increased privileges.
SOLUTION: Upgrade to VMS version 5.4-3 (or higher); alternatively,
install a new SYS$SHARE:SPISHR.EXE or implement workarounds
given in CIAC Bulletin C-30.
______________________________________________________________________________
Critical Information about the MONITOR Patch

CIAC issued Bulletin C-30 on August 31, 1992, which described the VAX/VMS
MONITOR vulnerability in VMS Versions 5.0 through 5.4-2. Bulletin C-30
contained Digital Equipment Corporation (DEC) advisory SSRT-0200, which gave
workarounds.

This bulletin contains DEC's addendum, SSRT-0200-1, which announces the
availability of a kit to fix problems with the affected VMS versions. The
kit is identified as MONITOR$S01_050, MONITOR$S01_051, MONITOR$S01_052,
MONITOR$S01_053 and MONITOR$S01_054. It contains a new binary image of
SYS$SHARE:SPISHR.EXE, appropriate to the version of VMS being fixed. It is
available from DEC's Digital Services organization. In the U.S.A., it is
also available via DSIN or DSNlink as CSCPAT_1047.

DEC's advisory notice follows:
==============================================================================
21-OCT-1992 SSRT-0200-1 (ADDENDUM)
21-AUG-1992 SSRT-0200

SOURCE: Digital Equipment Corporation
AUTHOR: Software Security Response Team - U.S.
Colorado Springs USA
PRODUCT: VMS MONITOR V5.0 through V5.4-2
PROBLEM: Potential Security Vulnerability in VMS MONITOR Utility
SOLUTION: A VMS V5.0 through V5.4-2 remedial kit is now available
by contacting your normal Digital Services Support
organization.
NOTE: This problem has been corrected in VAX/VMS V5.4-3
(released in October 1991).

_____________________________________________________________________
The kit may be identified as MONTOR$S01_05* or CSCPAT_1047,
available via DSIN and DSNlink.
_____________________________________________________________________
Copyright (c) Digital Equipment Corporation, 1992 All Rights Reserved.
Published Rights Reserved Under the Copyright Laws of the United States.

________________________________________________________________________
ADVISORY ADDENDUM INFORMATION:
________________________________________________________________________

In August 1992, an advisory and article was distributed describing a
potential security vulnerability discovered in the VMS MONITOR utility.
Suggested workarounds to remove the vulnerability were provided. The
advisory was labeled SSRT-0200 "Potential Security Vulnerability in VMS
MONITOR Utility."

This addendum follows that advisory with information of the availability
of a kit containing a new SYS$SHARE:SPISHR.EXE for VMS V5.0-* through
VMS V5.4-2 and may be identified as MONTOR$S01_050 through MONTOR$S01_054
respectively from your Digital Services organization. In the U.S., the
kit is also identified as CSCPAT_1047, available via DSIN and DSNlink.

Note: This potential vulnerability does not exist in VMS V5.4-3 and later
versions of VMS. Digital strongly recommends that you upgrade to a
minimum of VMS V5.4-3, and further, to the latest release of VMS, V5.5-1
(released in July, 1992).

If you cannot upgrade to a minimum of VMS V5.4-3 at this time,
Digital strongly recommends that you install the available V5.0-*
through V5.4-2 patch kit on your system(s), available from your support
organization, to avoid any potential vulnerability.

You may obtain a kit for VMS V5.0 thru V5.4-2 by contacting your normal
Digital Services support organization (Customer Support Center, using
DSNlink or DSIN, or your local support office).

As always, Digital recommends that you periodically review your system
management and security procedures. Digital will continue to review and
enhance the security features of its products and work with customers to
maintain and improve the security and integrity of their systems.
________________________________________________________________________
End of Advisory SSRT-0200-1
==============================================================================

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX messages
to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number
855-0070 (primary) or 855-0074 (secondary).

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400
baud at (510) 423-4753 and 9600 baud at (510) 423-3331.
Previous CIAC bulletins and other information is available via
anonymous ftp from irbis.llnl.gov (ip address 128.115.19.60).

CIAC wishes to thank Rich Boren of DEC's Software Security Response
Team (SSRT) for the information used in this bulletin.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team.
Your agency's team will coordinate with CIAC.

This document was prepared as an account of work sponsored by an agency
of the United States Government. Neither the United States Government
nor the University of California nor any of their employees, makes any
warranty, expressed or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, product, or process disclosed, or represents that its use
would not infringe privately owned rights. Reference herein to any
specific commercial products, process, or service by trade name,
trademark manufacturer, or otherwise, does not necessarily constitute or
imply its endorsement, recommendation, or favoring by the United States
Government or the University of California. The views and opinions of
authors expressed herein do not necessarily state or reflect those of
the United States Government nor the University of California, and shall
not be used for advertising or product endorsement purposes.
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
INFORMATION BULLETIN

18 New and Upgraded Security Patches Available For SunOS

November 11, 1992, 1200 PST Number D-04

______________________________________________________________________________
PROBLEMS: Various security vulnerabilities.
PLATFORMS: SunOS 4.1.3, 4.1.2, 4.1.1, 4.1, 4.0.3 and 5.0 (Solaris 2.0FCS).
DAMAGE: Unauthorized root access and privileges, denial of service,
other damage as noted below.
SOLUTION: Apply Sun Patches as described.
______________________________________________________________________________
Critical Information about SunOS Security Patches

CIAC has received information from Sun Microsystems regarding the
availability of the following eighteen security patches for SunOS
versions 4.1.3, 4.1.2, 4.1.1, 4.1, 4.0.3 and Solaris 2.0FCS (which
contains SunOS 5.0).

The patches are available through your local Sun Answer Center and
via anonymous ftp. In the U.S., ftp to ftp.uu.net and retrieve the
patches from the /systems/sun/sun-dist directory. In Europe, ftp to
mcsun.eu.net and retrieve the patches from the ~ftp/sun/fixes
directory. The patches are contained in compressed tar files named
[patch].tar.Z. For example, if you wish to obtain patch 100103-11,
the tarfile would be 100103-11.tar.Z. Each patch has been checksummed
using the SunOS "sum" command so its validity can be verified by the
end user. If you find that the checksum differs from that listed
below, please contact Sun Microsystems or CIAC for confirmation before
using the patch. To install the patches on your system, follow the
instructions contained in the README files which accompany each patch.


The following ten patches (except for the last, which is a new patch)
are new revisions, superseding older patch versions, and they all
include fixes for new bugs. All designated versions of SunOS should
be upgraded with these patches. Refer to the CIAC bulletins listed,
or contact CIAC for more information on each vulnerability. A brief
description of each patch is provided.

Patch Checksum SunOS Versions CIAC Bulletins
----- -------- -------------- --------------
100103-11 19847 6 4.1.3, 4.1.2, 4.1.1, 4.1 B-26
A shell script modifies file permissions to a more secure
mode. The script changes the permissions for two
additional files:
/var/yp/`domainname`/mail.aliases.dir and
/var/yp/`domainname`/mail.aliases.pag

100173-09 28314 788 4.1.3, 4.1.2, 4.1.1, 4.1 C-28
NFS jumbo patch - Repairs a problem when accessing NFS
mounted files as root. This patch requires that a new
kernel be configured, made and installed. The installer
needs to build a new kernel only once even if multiple
patches are installed, as long as all the object files
(".o" files) from all patches are loaded.

100267-09 55338 5891 4.1.1 (contact CIAC)
This is the international version of the libc replacement
with all 4.1.1 patches. New bug fixes include: innetgr may
acknowledge false netgroup membership, undefined symbols
when linking statically with "mblen()", mbtowc and mbstowcs
give different results for same character.

100305-10 28781 368 4.1.3, 4.1.2, 4.1.1, 4.1 B-30, B-33
Fix for lpr, lpd, lpstat -v, passwd, delete, and system.
This patch also contains a new bug fix for lpstat -v.

100377-05 29141 1076 4.1.3, 4.1.2, 4.1.1, 4.1 C-26, A-16
sendmail jumbo patch - Fixes sendmail, sendmail.mx
Remedies five new bugs in sendmail.

100507-04 57590 61 4.1.3, 4.1.2, 4.1.1 (contact CIAC)
tmpfs jumbo patch - Copying files from an NFS mounted
partition to a tmpfs mount can result in a security breach.
This patch requires that a new kernel be configured, made
and installed. The installer needs to build a new kernel
only once even if multiple patches are installed, as long
as all the object files (".o" files) from all patches are
loaded.

100513-01 20616 480 4.1.3, 4.1.2, 4.1.1, 4.1 B-10
tty jumbo patch - Consolidates many patches, including
security patch 100188-02 (TIOCCONS redirection of console
output/input). This patch requires that a new kernel be
configured, made and installed. The installer needs to
build a new kernel only once even if multiple patches are
installed, as long as all the object files (".o" files)
from all patches are loaded.

100201-06 13145 164 4.1.1, 4.1 (contact CIAC)
C2 jumbo patch - Fixes delay with yppasswd when running C2
with NIS, unprivileged access to environment variables, and
a problem where an image contains plaintext passwords and
passwd.adjunct file.

100564-05 00115 824 4.1.3, 4.1.2 (contact CIAC)
C2 jumbo patch - Fixes problem where an image contains
plaintext passwords and passwd.adjunct file.

100723-01 22726 1 Solaris 2.0FCS/SunOS 5.0 new patch
The Solaris 2.0FCS install leaves world-writable
directories. NOTE: this patch contains a README file only.
The README instructs the installer to run the following
command as root after the installation of
Solaris 2.0FCS/SunOS 5.0: #pkgchk -f
correcting directory and file attributes incorrectly
set during the installation process.


The following patch is an upgrade for compatibility with SunOS
versions 4.1.2 and 4.1.3. If you have a pre-4.1.2 system and have
previously loaded this patch, you need not apply this to your system.

100372-02 22739 712 4.1.3, 4.1.2, 4.1.1 (contact CIAC)
tfs and C2 do not work together. This patch is provided
for C2 security, and is only necessary if you use C2 with
tfs (translucent file service).


The following seven patches are upgraded to be compatible with SunOS
4.1.3. If you have a pre-4.1.3 system and have previously loaded
these patches, you need not apply these to your system.

100296-04 42492 40 4.1.3, 4.1.2, 4.1.1 C-06
Netgroup exports to world.

100482-03 27837 342 4.1.3, 4.1.2, 4.1.1, 4.1 C-25
ypserv, ypxfrd. Note: the /var/yp/securenets configuration
file provided with this patch does not support blank lines.

100383-05 52230 135 4.1.3, 4.1.2, 4.1.1, 4.1, 4.0.3 C-04, C-08
rdist security enhancement.

100567-04 15728 11 4.1.3, 4.1.2, 4.1.1, 4.1 C-28
icmp redirects, mfree panic. This patch requires that a new
kernel be configured, made and installed. The installer
needs to build a new kernel only once even if multiple
patches are installed, as long as all the object files
(".o" files) from all patches are loaded.

100630-01 28074 39 4.1.3, 4.1.2, 4.1.1, 4.1 C-26
100631-01 44444 25 4.1.3, 4.1.2, 4.1.1, 4.1 C-26
login, su, LD_ environment variables.
100630-01 is the international version of /bin/login for
systems not using the US Encryption Kit. /usr/bin/su and
/usr/5bin/su from the international version are suitable
for sites that use the US Encryption Kit.
100631-01 is the domestic version. To obtain 100631-01,
contact your local Sun Answer Center.

100633-01 33264 20 4.1.3, 4.1.2, 4.1.1 (contact CIAC)
Unbundled SunSHIELD ARM 1.0, "LD_" environment variables
can be used to exploit login/su, international version.


If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number
855-0070 (primary) or 855-0074 (secondary).

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400
baud at (510) 423-4753 and 9600 baud at (510) 423-3331.
Previous CIAC bulletins and other information is available via
anonymous ftp from irbis.llnl.gov (ip address 128.115.19.60).

CIAC wishes to thank Ken Pon of Sun Microsystems for the information
used in this bulletin.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response
team, DARPA's CERT/CC, NAVCIRT, and the Air Force response team.
Your agency's team will coordinate with CIAC. The Forum of Incident
Response and Security Teams (FIRST) is a world-wide organization. A
list of FIRST member organizations and their constituencies can be
obtained by sending email to Docserver@First.Org with a null subject
line, and the first line of the message reading: send first-contacts.

This document was prepared as an account of work sponsored by an agency
of the United States Government. Neither the United States Government
nor the University of California nor any of their employees, makes any
warranty, expressed or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, product, or process disclosed, or represents that its use
would not infringe privately owned rights. Reference herein to any
specific commercial products, process, or service by trade name,
trademark manufacturer, or otherwise, does not necessarily constitute or
imply its endorsement, recommendation, or favoring by the United States
Government or the University of California. The views and opinions of
authors expressed herein do not necessarily state or reflect those of
the United States Government nor the University of California, and shall
not be used for advertising or product endorsement purposes.

RESTRICTIONS: NONE

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Revised Hewlett-Packard NIS ypbind Vulnerability

January 22, 1993, 1400 PST Number D-05

_________________________________________________________________________
PROBLEM: Allows unauthorized access to NIS data.
PLATFORM: HP/UX Operating System for series 300, 700, and 800 computers.
DAMAGE: Remote and local users can obtain unauthorized privileges.
SOLUTION: Install revised patches.
_________________________________________________________________________
Critical Information about Hewlett-Packard NIS ypbind

The inclosed advisory was issued by the Computer Emergency Response
Team Coordination Center (CERT/CC) and is an update to a previous
advisory CA-92:17.

=============================================================================
CA-93:01 CERT Advisory
January 13, 1993
Revised Hewlett-Packard NIS ypbind Vulnerability

-----------------------------------------------------------------------------

*** THIS IS A REVISED CERT ADVISORY ***
*** IT CONTAINS NEW INFORMATION REGARDING AVAILABILITY OF IMAGE KITS ***
*** SUPERSEDES CERT ADVISORY CA-92:17 ***

The CERT Coordination Center has received information concerning a
vulnerability in the NIS ypbind module for the Hewlett-Packard (HP)
HP/UX Operating System for series 300, 700, and 800 computers.

HP has provided revised patches for all of the HP/UX level 8 releases
(8.0, 8.02, 8.06, and 8.07). This problem is fixed in HP/UX 9.0.
The following patches have been superseded:

Patch ID Replaced by Patch ID
PHNE_1359 PHNE_1706
PHNE_1360 PHNE_1707
PHNE_1361 PHNE_1708

All HP NIS clients and servers running ypbind should obtain and
install the patch appropriate for their machine's architecture
as described below.

-----------------------------------------------------------------------------

I. Description

A vulnerability in HP NIS allows unauthorized access to NIS data.

II. Impact

Root on a remote host running any vendor's implementation of NIS
can gain root access on any local host running HP's NIS ypbind.
Local users of a host running HP's NIS ypbind can also gain root access.

III. Solution

1) All HP NIS clients and servers running ypbind should obtain and
install the patch appropriate for their machine's architecture.

These patches contain a version of ypbind that accepts ypset
requests only from a superuser port on the local host. This prevents
a non-superuser program from sending rogue ypset requests to ypbind.
The patches also include the mod from the superseded patches that
prevents a superuser on a remote system from issuing a ypset -h
command to the local system and binding the system to a rogue ypserver.

These patches may be obtained from HP via FTP (this is NOT
anonymous FTP) or the HP SupportLine. To obtain HP security
patches, you must first register with the HP SupportLine.
The registration instructions are available via anonymous FTP at
cert.org (192.88.209.5) in the file
"pub/vendors/hp/supportline_and_patch_retrieval".
The new patch files are:

Architecture Patch ID Filename Checksum
------------ -------- -------- --------
Series 300 PHNE_1706 /hp-ux_patches/s300_400/8.X/PHNE_1706 38955 212
Series 700 PHNE_1707 /hp-ux_patches/s700/8.X/PHNE_1707 815 311
Series 800 PHNE_1708 /hp-ux_patches/s800/8.X/PHNE_1708 56971 299

2) The instructions for installing the patch are provided in the
PHNE_xxxx.text file (this file is created after the patch has
been unpacked).

The checksums listed above are for the patch archive files from HP.
Once unpacked, each shell archive contains additional checksum
information in the file "patchfilename.text". This checksum is
applicable to the binary patch file "patchfilename.updt".


If you have any questions about obtaining or installing the patches,
contact the USA HP SupportLine at 415-691-3888, or your local HP
SupportLine number. Please note that the telephone numbers in this
advisory are appropriate for the USA and Canada.

-----------------------------------------------------------------------------
The CERT Coordination Center wishes to thank Brian Kelley of Ford Motor
Company for bringing this vulnerability to our attention. We would also
like to thank Hewlett-Packard for their response to this problem.
-----------------------------------------------------------------------------
===========================================================================
CIAC would like to acknowledge the contributions of: CERT/CC.

For additional information or assistance, please contact CIAC at
(510)422-8193/FTS or send E-mail to ciac@llnl.gov. FAX messages to
(510)423-8002/FTS.

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400
baud at (510) 423-4753 and 9600 baud at (510) 423-3331.
Previous CIAC bulletins and other information is available via
anonymous ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Some of the other teams include the NASA NSI response team,
DARPA's CERT/CC, NAVCIRT, and the Air Force response team. Your
agency's team will coordinate with CIAC. The Forum of Incident Response
and Security Teams (FIRST) is a world-wide organization. A list of
FIRST member organizations and their constituencies can be obtained by
sending email to Docserver@First.Org with a null subject line, and the
first line of the message reading: send first-contacts.

This document was prepared as an account of work sponsored by an agency
of the United States Government. Neither the United States Government
nor the University of California nor any of their employees, makes any
warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights. Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation or favoring by the
United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government or the University of
California, and shall not be used for advertising or product
endorsement purposes.


_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Failure to disable user accounts for VMS 5.3 to 5.5-2

FEB 12, 1993 1400 PST Number D-06
________________________________________________________________________
PROBLEM: VMS systems configured to disable user accounts experiencing
break-in attempts may not disable those accounts, as required.
PLATFORM: VAXstations using DECwindows or Motif, VMS versions 5.3
through Open VMS 5.5-2.
DAMAGE: Unauthorized users could gain access given sufficient time.
SOLUTION: Apply patch CSCPAT_0239019 or physically secure workstations
if accounts are so configured.
________________________________________________________________________
Critical Facts about potential vulnerability in VMS VAXstations

CIAC has learned of a vulnerability in VAXstations running (Open) VMS
versions 5.3 through 5.5-2 when using VMS DECwindows or VMS DECwindows
MOTIF. The vulnerability applies to systems where the SYSGEN parameter
for disabling accounts under attack is enabled (i.e., LGI_BRK_DISUSER
is set to 1). If the "break-in limit," i.e, log-in failure count
threshold (SYSGEN parameter LGI_BRK_LIM) is exceeded during an interval
determined by an algorithm using LGI_BRK_TMO, the account will NOT be
disabled, allowing repeated attacks. Other security functions will
continue to work correctly, such as evasion and SYSUAF counts for
log-in failures, as well as security audit recording. The
vulnerability is not present when using non-local DECwindows or MOTIF
access via DECnet.

If you are not required to invoke automatic account disabling, CIAC
recommends that you secure your systems by prudently managing passwords
and effectively setting break-in detection and evasion SYSGEN
parameters. In most cases the default parameter settings are
adequate. You may further strengthen evasion security by

o reducing LGI_BRK_LIM (default 5 log-in attempts)
o increasing LGI_HID_TIM (default 300 seconds)
o increasing LGI_BRK_TMO (default 300 seconds)
o changing LGI_BRK_TERM to 0 (default is 1)

Be advised that each parameter change may increase the risk of denial
of service to legitimate users. If you have dial up access, make
certain that the parameter LGI_RETRY_LIM is not increased beyond its
default value of three.

In all cases, CIAC recommends that you first upgrade to the latest
version of Open VMS and windowing software (to correct other potential
vulnerabilities). To correct the potential vulnerability identified in
this bulletin, apply patch suite CSCPAT_0239019, available from
Digital. If you have DSNlink for VMS, use the DSNlink VTX Patch
Application. When prompted for a search string, use the keyword
CSCPAT_0239019. If you do not have DSNlink for VMS, contact your local
Digital office or your Digital Support Center for the patch.

If you cannot obtain or apply the patch, you should restrict
workstation physical access to authorized users.

For additional information or assistance, please contact CIAC at (510)
422-8193/FTS or send e-mail to ciac@llnl.gov. FAX messages to: (510)
423-8002/FTS.

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400 baud
at (510) 423-4753 and 9600 baud at (510) 423-3331. Previous CIAC
bulletins and other information is available via anonymous ftp from
irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

CIAC wishes to acknowledge Tom Moore and Mona Wecksung of Los Alamos
National Laboratory for bringing the vulnerability to our attention,
and Rich Boren of Digital's Software Security Response Team for leading
problem resolution efforts.

This document was prepared as an account of work sponsored by an agency
of the United States Government. Neither the United States Government
nor the University of California nor any of their employees, makes any
warranty, expressed or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, product, or process disclosed, or represents that its use
would not infringe privately owned rights. Reference herein to any
specific commercial products, process, or service by trade name,
trademark manufacturer, or otherwise, does not necessarily constitute
or imply its endorsement, recommendation, or favoring by the United
States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government nor the University of
California, and shall not be used for advertising or product
endorsement purposes.

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
LIMITED DISTRIBUTION BULLETIN

(1) UNICOS Running MLS
(2) UNICOS Environment Variable

February 23, 1993, 1700 PST Number D-07

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number 855-0070
(primary) or 855-0074 (secondary).

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400 baud
at (510) 423-4753 and 9600 baud at (510) 423-3331. Previous CIAC
bulletins and other information is available via anonymous ftp from
irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.
______________________________________________________

The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
______________________________________________________

A D V I S O R Y N O T I C E

Potential Vulnerability in VMS V5 and
Derivative Operating Systems

FEB 23, 1993 1200 PST Number D-08
___________________________________________________________________________
PROBLEM: Malicious program simplifies exploitation of VMS vulnerability.
PLATFORM: Systems running VMS V5.0 through OpenVMS V5.5-2 and
OpenVMS AXP V1.0 (including all SEVMS V5.1 through V5.5-2).
DAMAGE: Authorized unprivileged users could obtain all system privileges.
SOLUTION: Apply patch available from Digital Equipment Corporation.
___________________________________________________________________________
Critical Information about Potential Vulnerability in VMS

CIAC has learned of a potential vulnerability in VMS, OpenVMS and Security
Enhanced VMS (SEVMS) as described in the following advisory (which was
requested to be distributed intact) from Digital Equipment Corporation:
========================== Begin DEC Advisory =============================
DATE: 23.FEB.1993
SOURCE: Digital Equipment Corporation
AUTHOR: Software Security Response Team
Colorado Springs USA
PRODUCT: VMS V5.0 through OpenVMS V5.5-2 & OpenVMS AXP V1.0
PROBLEM: Potential Security Vulnerability - OpenVMS
SOLUTION: A remedial kit is now available for OpenVMS AXP V1.0,
VMS V5.0 through OpenVMS Version 5.5-2 (including all SEVMS
versions V5.1 through V5.5-2 as applicable) by contacting
your normal Digital Services Support organization.
SEVERITY LEVEL: High

This potential vulnerability has been corrected in the next release of
OpenVMS, V6.0 and OpenVMS AXP, V1.5. For VMS Versions prior to V5.0,
Digital strongly recommends that you upgrade to a minimum of VMS V5.0
and further, to the latest release of OpenVMS V5.5-2.
_________________________________________________________________________
The remedial kits may be identified as:
VAXSYS01_U2050 VMS V5.0, V5.0-1, V5.0-2
VAXSYS01_U1051 VMS V5.1 thru V5.1-1
VAXSYS01_U1052 VMS V5.2, V5.2-1
VAXSYS01_U2053 VMS V5.3 thru V5.3-2
VAXSYS01_U3054 VMS V5.4 thru V5.4-3
VAXSYS02_U2055 OpenVMS V5.5 thru V5.5-2
AXPSYS01_010 OpenVMS AXP V1.0
_________________________________________________________________________
Copyright (c) Digital Equipment Corporation, 1993 All Rights Reserved.
Published Rights Reserved Under The Copyright Laws Of The United States.
_________________________________________________________________________
ADVISORY INFORMATION:
_________________________________________________________________________
This update kit corrects a potential security vulnerability in the VMS,
OpenVMS VAX and OpenVMS AXP operating systems. This potential
vulnerability may be further exploited in the form of a malicious program
that may allow authorized but unprivileged users to obtain all system
privileges, potentially giving the unprivileged user control of your
OpenVMS system and data.

NOTE:
The update kit must be applied if an update or installation is performed
for all versions prior to OpenVMS V6.0 or OpenVMS AXP V1.5. For VMS
Versions prior to VMS V5.0, Digital strongly recommends that you upgrade
to a minimum of VMS V5.0 and further to the latest release of OpenVMS
V5.5-2.
_________________________________________________________________________
PATCH KIT INFORMATION:
_________________________________________________________________________
Digital strongly recommends that you install the available kit on your
system(s), to avoid any potential vulnerability as a result of this
problem.

Customers with a Digital Services contract may obtain a kit for the
affected versions of OpenVMS by contacting your normal support
organizations.

- In the U.S. Customers may contact the Customer Support Center
at 1(800)354-9000 and request the appropriate kit for your version
of OpenVMS, or through DSNlink Text Search database using the
keyword text "Potential Security Vulnerability", or DSNlink VTX using
the patch number 1084

- Customers in other geographies should contact their normal Digital
Services support organizations.

As always, Digital recommends you to regularly review your system
management and security procedures. Digital will continue to review and
enhance security features, and work with our customers to further improve
the integrity of their systems.
=========================== End DEC Advisory ==============================

CIAC recommends that you follow the DEC advisory to obtain and install
the appropriate patch.

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies and off-hour assistance call 1-800-SKYPAGE and enter
PIN number 855-0070 (primary) or 855-0074 (secondary).

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400 baud
at (510) 423-4753 and 9600 baud at (510) 423-3331. Previous CIAC
bulletins and other information is available via anonymous ftp from
irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.
______________________________________________________

The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
____________________________________________________

I N F O R M A T I O N B U L L E T I N

OpenVMS Security Patch #1084 Problems
Addendum to CIAC Advisory D-08

MAR 2, 1993 1400 PST Number D-09
___________________________________________________________________________
PROBLEM: Systems with security patch #1084 installed will not boot after
performing certain system upgrades.
PLATFORM: VMS, OpenVMS VAX and SEVMS systems.
DAMAGE: System security is not affected.
SOLUTION: Restore the old files before upgrading or apply a patch to the
new IMAGE_MANAGEMENT.EXE file.
___________________________________________________________________________
Critical Information about OpenVMS VAX Patch Problems

CIAC has learned that applying specific system upgrades to VMS, OpenVMS VAX
and Security Enhanced VMS (SEVMS) which have been patched as described in CIAC
Advisory D-08 "Potential Vulnerability in VMS V5 and Derivative Operating
Systems, February 23, 1993" leaves systems which will not boot. The patch is
#1084 and the specific upgrades are: V5.3 to V5.3-1; V5.3-1 to V5.3-2; V5.5 to
V5.5-2; V5.5-1 to V5.5-2. All other upgrades are not affected.

This patch's installation procedure leaves the old IMAGE_MANAGEMENT.EXE and
PAGE_MANAGEMENT.EXE files in the SYS$COMMON:[SYS$LDR] directory. The system
can be restored for upgrade as long as these files have not been removed.
Prior to system upgrade, use rename to change the old files to a higher
version than the new files. Otherwise, take the corrective action described
in addendum SSRT 02.25-01 (see below). DEC requests that 02.25-01 be
redistributed intact.

========================== Begin DEC Addendum 02.25-01 ========================
SSRT 02.25 - 01 01.MAR.1993 Addendum Advisory
RE: SSRT 02.25 dated 23.FEB.1993

SOURCE: Digital Equipment Corporation
AUTHOR: Software Security Response Team
Colorado Springs, CO.
DESCRIPTION
------------
Digital has received information concerning a problem while upgrading
the OpenVMS VAX Version paths listed below.

OpenVMS VAX versions affected:
------------------------------
upgrade paths V5.3 to V5.3-1
V5.3-1 to V5.3-2
V5.5 to V5.5-2
V5.5-1 to V5.5-2

A problem will occur during an upgrade to a system that previously installed
the Security Kit identified as:

CSCPAT_1084010.A (combined kit for all OpenVMS VAX
Versions affected. DSNlink kit.)
VAXSYS01_U2053.A OpenVMS V5.3, V5.3-1, V5.3-2
VAXSYS02_U2055.A OpenVMS V5.5, V5.5-1, V5.5-2
NOTE:
*****
All other applicable versions of OpenVMS VAX and their supported upgrade paths
do not exhibit this symptom if the Security Kit (identified in an advisory
SSRT 02.25 dated 23.FEB.1993) was installed before upgrading to the next
higher version.

The Security Kit must be re-applied after all OpenVMS VAX upgrades for V5.0
through V5.5-2. Digital recommends that until OpenVMS VAX V6.0 or OpenVMS
AXP V1.5 is installed later this year, contact your Digital Services Support
organization to obtain the most current version of the applicable Security
Kit.

IMPACT
---------
Anyone who upgrades from OpenVMS VAX V5.3 to V5.3-1, V5.3-1 to V5.3-2,
V5.5 to V5.5-2, or V5.5-1 to V5.5-2 will experience an error directly related
to having the Security Kit installed prior to the OpenVMS VAX upgrades listed
above. The system will to fail to boot properly after the completion of the
upgrade.

SOLUTION
---------
If you renamed the images replaced following the installation of the Security
Kit, restore the saved images prior to upgrading OpenVMS VAX to the next
higher release then re-apply the Security Kit. The images replaced by
the Security Kit identified above are:

PAGE_MANAGEMENT.EXE & IMAGE_MANAGEMENT.EXE
and placed in the directory SYS$COMMON:[SYS$LDR]

WARNING: To prevent a similar problem ensure that no copies of the above
images exist in the SYS$SPECIFIC:[SYS$LDR] directory.


If the images replaced during the Security Kit installation cannot be restored
prior to your upgrade, enter the commands (as indicated below) after your
OpenVMS VAX upgrade completes.

**** IN EACH CASE, THE SOLUTION BELOW IS A POST OpenVMS VAX UPGRADE EVENT ****

!For OpenVMS VAX V5.3 upgrade paths
! V5.3 to V5.3-1
! V5.3-1 to V5.3-2
!
! At the point where the OpenVMS upgrade process has completed:
! From the systems console invoke a conversational boot then enter the
! remaining commands as shown and follow the instructions for re-booting.

>>>
>>> B/1 !YOUR PARTICULAR BOOT FOR CONVERSATIONAL MODE MAY BE DIFFERENT
SYSBOOT> SET/START=OPA0:
SYSBOOT> C
$
$ set noon
$ set default [vms$common.sys$ldr]
$ patch/update=(1) image_management.exe
SET ECO 1
REPL/INST 0A0F='BISB2 #01,B^1F(SP)'
'NOP'
EXIT
UPDATE
EXIT

Press the HALT button, reboot the system, and re-install the Security Kit and
reboot again for the installation to become effective.

----------------------------------------------------------------------------

!For OpenVMS VAX V5.5 upgrade paths
! V5.5 to V5.5-2
! V5.5-1 to V5.5-2
!
! At the point where the OpenVMS upgrade process has completed:
! From the systems console invoke a conversational boot then enter the
! remaining commands as shown and follow the instructions for re-booting.

>>>
>>> B/1 !YOUR PARTICULAR BOOT FOR CONVERSATIONAL MODE MAY BE DIFFERENT
SYSBOOT> SET/START=OPA0:
SYSBOOT> C

$ set noon
$ set default [vms$common.sys$ldr]
$ patch/update=(1) image_management.exe
SET ECO 1
REPL/INST 0A2F='BISB2 #01,B^1F(SP)'
'NOP'
EXIT
UPDATE
EXIT
$

Press the HALT button, reboot the system, and re-install the Security Kit and
reboot again for the installation to become effective.
-----------------------------------------------------------------------------
Copyright (c) Digital Equipment Corporation, 1993 All Rights Reserved.
Published Rights Reserved Under The Copyright Laws Of The United States.
=========================== End DEC Addendum 02.25-01 =========================

CIAC recommends that you follow the DEC advisory addendum if performing an
upgrade for the specific versions indicated. If you need additional
information, contact Mr. Richard Boren of DEC's Software Security Response
Team (SSRT) at 719-592-4689. CIAC wishes to thank Rich for supplying the
advisory used in this bulletin.

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies and off-hour assistance call 1-800-SKYPAGE and enter
PIN number 855-0070 (primary) or 855-0074 (secondary).

The CIAC Bulletin Board, Felicia, can be accessed at 1200 or 2400 baud
at (510) 423-4753 and 9600 baud at (510) 423-3331. Previous CIAC
bulletins and other information is available via anonymous ftp from
irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for the
accuracy, completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately owned
rights. Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.
_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

November 17 Virus on MS DOS Computers

March 15, 1993 1000 PST Number D-10
__________________________________________________________________________
NAME: November 17 virus
ALIASES: NOV 17, 855
PLATFORM: MS DOS Computers
DAMAGE: On November 17 will destroy hard disk contents
SYMPTOMS: Files grow by 855, 768, 880, or 800 bytes
DETECTION/
ERADICATION: FPROT 207, Scan V102, Novi
__________________________________________________________________________
Critical Facts about the November 17 virus

The November 17 virus is a simplistic file infector virus which has
recently been discovered to be fairly widespread. This virus will
overwrite the hard disk on November 17 of any year.

Infection Mechanism

This virus is a file infector virus (see CIAC bulletins A-20, A-27,
A-29, B-35, and 3 bulletins from Fiscal Year 1989 for information on
similar file infector viruses). Upon execution of a virus-infected
program, NOV 17 will become memory resident at the top of memory and
inhabit 896 bytes of memory.

Once resident, it will infect any .COM and .EXE programs when the file
attributes are set or read, when the file is opened for READ, and upon
loading and execution. Therefore, if the virus is resident in memory,
and a new disk with clean executibles is copied, the original disk's
.EXE and .COM files will become infected if the disk is not
write-protected. It can easily be transferred via LAN's anytime an
executible file is opened or executed over the LAN. This virus will
not infect files with a filename of SCAN.EXE or CLEAN.EXE, and it will
not infect files that have the system bit set. It does not affect
data files.

Potential Damage

On November 17 of any year this virus will overwrite portions of the
C: drive or current drive, depending on the variant. On any other day
of the year this virus will simply replicate. Some variants will
cause this overwrite process to occur on days after November 17.

Detection and Eradication

Many recent versions of antivirus products will detect this virus.
Another method of direct detection is to search for the string
"SCAN.CLEAN.COMEXE", which can be found within the virus code of every
infection.

Until March of 1993, there had been no reports of this virus in the
United States. Because of this fact, some anti-virus products do not
detect the presence of it by name. Some products, such as Data
Physician Plus!, do detect when it they themselves become infected, at
which point a message such as "A virus has been detected, would you
like to continue?" may appear on the screen. This message means that
the antivirus product's self check mechanism has detected a
modification to itself, and at this point CIAC recommends that you
check the machine with a different antivirus product, or call CIAC for
additional information on virus handling.

Virus Variants

There are four known variants to this virus, all increase file lengths
by a different amount and take up a different amount of resident
memory. The variants increase file lengths of infected files by 768,
800, 880, and 855 bytes. The 768 variant is almost identical to the
original virus but takes up 800 bytes of memory; it was discovered in
May of 1992. The variant which adds 800 bytes to files takes up 832
bytes of memory, was discovered in March of 1993, and activates
November 17-30 of any year. The 880 variant, which uses 928 bytes of
memory, first seen in November, 1992, will activate on any date from
November 17-December 31 of any year. The 855 variant, also called
Nov17B, first seen in September of 1992, causes infected .EXE files to
hang the system when executed.

Due to the nature of this virus's infection mechanism, it is sometimes
not possible to remove the infection from a host program. CIAC
recommends that if this virus is discovered a copy be kept and then
all infected files be deleted and restored from backup.


For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send E-mail to ciac@llnl.gov. FAX
messages to (510) 423-8002 / FTS.

Previous CIAC bulletins and other information are available via anonymous
ftp from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.
_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Sun Security Patches and Software Updates

March 19, 1993 1400 PST Number D-11
__________________________________________________________________________
PROBLEM: Security vulnerabilities in SunOS, DNI, and PC-NFS.
PLATFORM: All Sun platforms running SunOS 4.0.3 or later, including
Solaris 2.0 and 2.1.
DAMAGE: Unauthorized root access, denial of service, and other
as detailed below.
SOLUTION: Apply Sun patches and/or obtain software upgrades.
__________________________________________________________________________
Critical Facts about Sun Security Patches and Software Upgrades


CIAC has received information from Sun Microsystems regarding the
availability of new and updated security patches for the SunOS
operating system. Sun Microsystems has also announced the availability
of new versions of its DECnet Interface (DNI) and PC-NFS software
packages that correct security vulnerabilities of previous releases.


PATCH INFORMATION
=================

Sun security patches are available through your local Sun Answer Center
and via anonymous ftp. In the U.S., ftp to ftp.uu.net and retrieve the
patches from the /systems/sun/sun-dist directory. In Europe, ftp to
mcsun.eu.net and retrieve the patches from the /sun/fixes directory.
The patches are contained in compressed tarfiles named [patch].tar.Z.
For example, if you wish to obtain patch 100891-01, the corresponding
compressed tarfile would be named 100891-01.tar.Z.

Each compressed tarfile has been checksummed using the SunOS "sum"
command. After retrieving each patch, the checksum should be recomputed
and compared to those listed in this bulletin. If you find that the
checksum for a patch differs from those listed below, please contact
Sun Microsystems or CIAC for confirmation before using the patch.
To install the patches, follow the instructions contained in the README
files that accompany each patch.

Patches Providing New or Additional Security Features
=====================================================

The following patches are either new security patches or new versions of
existing patches that provide additional security features or support
additional Sun platforms. CIAC recommends the installation of all
applicable security patches.

Patch Checksum SunOS Versions
----- -------- --------------
100891-01 33195 3075 4.1.3
libc replacement - Corrects insecure handling of netgroups
and fixes a bug in xlock that could cause it to crash and
leave the system unprotected.

100884-01 03775 2610 5.1 (Solaris 2.1)
Closes security vulnerability with the srmmu window handler.

100833-02 49753 155 5.1 (Solaris 2.1)
Required for use of Sun's unbundled Basic Security Module
(BSM) with Solaris 2.1.

100623-03 56063 141 4.1.2, 4.1.3
UFS Jumbo Patch - Non-random file handles can be guessed.
This patch should be applied after the most recent version
of 100173.

100448-01 29285 5 4.1.1, 4.1.2, 4.1.3
OpenWindows 3.0 loadmodule Patch - This release adds
support for SunOS 4.1.3. Sites running SunOS 4.1.1 or
4.1.2 do not need to install this patch again if it was
previously installed.

100305-11 38582 500 4.1, 4.1.1, 4.1.2, 4.1.3
This patch fixes incorrect user ID checking in
/usr/ucb/lpr.

100121-09 57589 360 4.1
NFS Jumbo Patch - This patch adds support for sun4e
architectures. Other architectures need not reinstall
the patch if a previous version was installed.

Patches Updated with Non-security Features
==========================================

The following security patches have been updated with non-security
related enhancements. Systems with previous versions of these patches
already installed do not need install the new versions unless the
additional non-security related enhancements are desired.

Patch Checksum SunOS Versions
----- -------- --------------
100513-02 34315 483 4.1, 4.1.1, 4.1.2, 4.1.3
Jumbo tty Patch - This release fixes a tty bug that can
cause system crashes. Previous releases corrected a
vulnerability that allowed console input and output
to be redirected.

100482-04 06594 342 4.1, 4.1.1, 4.1.2, 4.1.3
ypserv and ypxfrd security patch - Corrects incorrect
DNS lookup failures when a host is up but has no
nameserver running. Previous releases of this patch
corrected a condition that allowed NIS to distribute maps,
including the password map, to anyone. Note: the
/var/yp/securenets configuration file cannot contain blank
lines.

100452-28 07299 1688 4.1, 4.1.1, 4.1.2, 4.1.3
XView 3.0 Jumbo Patch - This release fixes several
OpenWindows and XView bugs, including problems with
mailtool and filemgr. Previous releases corrected a
problem with cmdtool that allowed the disclosure of
passwords.

100383-06 58984 121 4.0.3, 4.1, 4.1.1, 4.1.2, 4.1.3
rdist Patch - This release allows /usr/ucb/rdist to
transfer hard linked files. Previous releases of this
patch corrected a bug that allowed users to gain root
access.

100224-06 57647 54 4.1.1, 4.1.2, 4.1.3
/bin/mail Jumbo Patch - This release corrects a problem
that caused /bin/mail to crash. Previous releases
corrected a problem that allowed /bin/mail to be used to
invoke a root shell.

100173-10 48086 788 4.1.1, 4.1.2, 4.1.3
NFS Jumbo Patch - This release corrects poor NFS write
append performance. Previous versions of this patch
corrected a bug with the handling of setuid programs
copied to NFS file systems.


DECnet Interface (DNI) Update
=============================
Versions of Sun's DNI product prior to 7.0.1 are known to have two
security vulnerabilities:
- dni_rc_ins creates an rc script with world writable permissions.
- Files copied to VAX/VMS systems using dnicp are assigned
incorrect permissions.
To close the vulnerabilities, Sun recommends that you upgrade to DNI
version 7.0.1. Sun has distributed the upgrade free of charge to all
customers with a DNI support contract. Those customers not on
software support should obtain the upgrade through their standard Sun
sales channels.


PC-NFS Update
=============
The PC-NFS printing and authentication daemon pcnfsd allows
unauthorized access to the system. It is recommended that sites with
pcnfsd installed upgrade to the latest version.

The latest version of pcnfsd may be obtained free of charge via
anonymous ftp from bcm.tmc.edu in the /pcnfs directory and from
src.doc.ic.ac.uk in the /pub/sun/pc-nfs directory in a file named
pcnfsd.93.02.16.tar.Z.


For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send E-mail to ciac@llnl.gov. FAX
messages to (510) 423-8002 / FTS.

Previous CIAC bulletins and other information are available via
anonymous ftp from irbis.llnl.gov (IP address 128.115.19.60).

CIAC wishes to thank Ken Pon and Mark Allen of Sun Microsystems for
their assistance in the preparation of this bulletin.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.
VENDOR RESTRICTED
FOR DEPARTMENT OF ENERGY CRAY SITES ONLY
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
LIMITED DISTRIBUTION BULLETIN

(1) UNICOS Running MLS (update to CIAC D-07)
(2) UNICOS Operator Group

April 2, 1993, 1000 PST Number D-12

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number 855-0070
(primary) or 855-0074 (secondary).

Previous CIAC bulletins and other information is available via anonymous
ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.
RESTRICTIONS: NONE
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
ADVISORY NOTICE

wuarchive FTP daemon vulnerability

April 09, 1993, 1030 PDT Number D-13
__________________________________________________________________________
PROBLEM: The wuarchive FTP daemon allows unauthorized access.
PLATFORM: UNIX systems running the wuarchive FTP daemon.
DAMAGE: Unauthorized access to the system.
SOLUTION: Disable daemon, then patch or install new version.
__________________________________________________________________________
Critical Facts about wuarchive FTP Daemon Vulnerability


CIAC has learned that Washington University's wuarchive FTP server
contains a serious security vulnerability, allowing any user (remote or
local) to gain access with the privileges of any user on the system,
including root. If you are running any version of the wuarchive server
prior to April 8, 1993, CIAC recommends that you disable it
immediately, then either apply the patch, or replace it with the new
version.

PATCH
-----
Apply the following patch to your existing wuarchive ftpd sources,
recompile and install.

*** ftpd.c.orig
--- ftpd.c
***************
*** 413,418 ****
--- 413,420 ----
end_login();
}

+ anonymous = 0;
+
if (!strcasecmp(name, "ftp") || !strcasecmp(name, "anonymous")) {
if (checkuser("ftp") || checkuser("anonymous")) {
reply(530, "User %s access denied.", name);

NEW VERSION
-----------
The new version is available for anonymous ftp from wuarchive.wustl.edu
(128.252.135.4) in the directory /packages/wuarchive-ftpd and from
irbis.llnl.gov (128.115.19.60) in /pub/util. The file is named
wu-ftpd-2.0.tar.Z and has a checksum (obtained using the "sum" command)
of 56984 169. This release includes full documentation for installation
and configuration. See wu-ftpd-2.0/INSTALL, wu-ftpd-2.0/NOTES and
wu-ftpd-2.0/doc/README for more information on how to install and
operate this ftp server.

For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send E-mail to ciac@llnl.gov. FAX messages
to (510) 423-8002 / FTS.

CIAC would like to acknowledge the contributions of CERT Coordination
Center in the preparation of this bulletin.

Previous CIAC bulletins and other information is available via anonymous
ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.

VENDOR RESTRICTED
FOR DEPARTMENT OF ENERGY CRAY SITES ONLY
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
LIMITED DISTRIBUTION BULLETIN

(1) UNICOS Cleantmp Utility
(2) UNICOS X11 Client xterm

April 29, 1993, 1400 PDT Number D-14

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number 855-0070
(primary) or 855-0074 (secondary).

Previous CIAC bulletins and other information is available via anonymous
ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

Vulnerability in Cisco Routers used as Firewalls

May 12, 1993 1500 PDT Number D-15
__________________________________________________________________________
PROBLEM: Under certain circumstances, Cisco routers will pass IP source
routed packets that should be denied.
PLATFORM: Cisco routers -- software releases 8.2, 8.3, 9.0, 9.1, and 9.17.
DAMAGE: Unauthorized packets may be passed.
SOLUTION: Apply upgrade or use access lists.
__________________________________________________________________________

Critical Information about vulnerability in Cisco routers

CIAC has learned that under certain circumstances Cisco routers will
pass IP source routed packets that should be denied, potentially
passing unauthorized packets. This vulnerability affects Cisco
routers with software releases 8.2, 8.3, 9.0, 9.1, and 9.17 using the
"no IP source-route" command. CIAC recommends that sites using Cisco
routers for firewall protection apply upgrades as indicated below. If
you are unable to upgrade immediately, you may use access lists to deny
unauthorized packets.

This vulnerability is fixed in Cisco software releases 8.3(7.2),
9.0(5), 9.1(4), 9.17(2.1), and all later releases. Sites using
release 8.2 need to upgrade to a later release; release 8.3 should
apply update (8); release 9.0, update (5); release 9.1, update (4);
and release 9.17, update (3). Those customers having a maintenance
contract may obtain these releases through Cisco's Customer
Information On-Line (CIO). Other customers may obtain them through
Cisco's Technical Assistance Center (800.553.2447 -- Internet:
tac@cisco.com) or by contacting their local Cisco distributor.
Contact Cisco's Technical Assistance Center for more information.

For additional information or assistance, please contact CIAC at
(510)422-8193/FTS or send E-mail to ciac@llnl.gov. FAX messages to
(510)423-8002/FTS.

CIAC wishes to thank the CERT Coordination Center for the information
used in this bulletin.

Previous CIAC Bulletins and other information are available via
anonymous ftp from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.


_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

ADVISORY NOTICE

Vulnerability in SunOS expreserve Utility

June 11, 1993 0001 PDT Number D-16
__________________________________________________________________________
PROBLEM: The expreserve utility allows unauthorized access to system
files.
PLATFORM: Sun workstations running SunOS versions 4.1, 4.1.1, 4.1.2,
4.1.3, 5.0, 5.1, and 5.2.
DAMAGE: Local users can gain root access.
SOLUTION: Disable expreserve immediately, then install patch from Sun.
__________________________________________________________________________

Critical Information about the expreserve Vulnerability

CIAC has learned that the expreserve utility in SunOS versions 4.1,
4.1.1, 4.1.2, 4.1.3, 5.0, 5.1, and 5.2 contains a serious
vulnerability that allows any file on the system to be overwritten.
This vulnerability can be used to obtain root access to the system.
CIAC strongly recommends that the expreserve utility be disabled
immediately, and that patched versions be installed as they become
available. Sun Microsystems has released patch 101080-01 which
corrects the vulnerability in SunOS 4.x systems. CIAC will announce
future patches as they become available.

Disabling expreserve
--------------------
To prevent use of the expreserve utility, execute the following command
as root:

/bin/chmod a-x /usr/lib/expreserve

The expreserve command normally is used to recover vi editor files
when vi terminates unexpectedly. Disabling expreserve will disable
this recovery feature. Users of vi should be advised of this
temporary change and encouraged to save their work frequently.

Patching SunOS version 4.x
--------------------------
Sun Microsystems has made available a patched version of expreserve
for SunOS Versions 4.1, 4.1.1, 4.1.2, and 4.1.3 that corrects this
vulnerability. It is available both through your local Sun Answer
Center and anonymous ftp. In the U.S., ftp to ftp.uu.net and retrieve
the file /systems/sun/sun-dist/101080-01.tar.Z. In Europe, ftp to
mcsun.eu.net and retrieve the file /sun/fixes/101080-01.tar.Z. After
retrieving the patch, its checksum may be verified using the following
command:

/bin/sum 101080-01.tar.Z

The sum command should return a checksum of 45221 13. Note that Sun
Microsystems occasionally updates patch files, resulting in a changed
checksum. Should you find that your checksum differs, please contact
CIAC or Sun Microsystems for verification before installing the
patch.

The patch may be extracted using the following commands:

/usr/ucb/uncompress 101080-01.tar.Z
/bin/tar xvf 101080-01.tar

To install the patch on your system, follow the instructions contained
in the README file that accompanies the patch.

For additional information or assistance, please contact CIAC at
(510)422-8193/FTS or send E-mail to ciac@llnl.gov. FAX messages to
(510)423-8002/FTS.

CIAC wishes to acknowledge the contributions of the CERT Coordination
Center and Sun Microsystems in the preparation of this bulletin.

Previous CIAC bulletins and other information are available via
anonymous ftp from irbis.llnl.gov (IP 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.
VENDOR RESTRICTED
FOR DEPARTMENT OF ENERGY CRAY SITES ONLY
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
LIMITED DISTRIBUTION BULLETIN

June 17, 1993, 1500 PDT Number D-17

If you require additional assistance or wish to report a vulnerability,
call CIAC at (510) 422-8193 or send e-mail to ciac@llnl.gov. FAX
messages to: (510) 423-8002.

For emergencies only, call 1-800-SKYPAGE and enter PIN number 855-0070
(primary) or 855-0074 (secondary).

Previous CIAC bulletins and other information is available via anonymous
ftp from irbis.llnl.gov (ip address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum of
Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

INFORMATION BULLETIN

Solaris 2.x expreserve patches available

July 1, 1993 0900 PDT Number D-18
__________________________________________________________________________
PROBLEM: The expreserve utility allows unauthorized access to system
files.
PLATFORM: Sun workstations running Solaris 2.0, 2.1, and 2.2
(SunOS 5.0, 5.1, and 5.2).
DAMAGE: Local users can gain root access.
SOLUTION: Disable expreserve immediately, then install patch from Sun.
__________________________________________________________________________

Critical Information about the expreserve Vulnerability

CIAC has learned that Sun Microsystems has released three new security
patches for Solaris 2.x systems to remove the vulnerability in the
expreserve utility described in CIAC Advisory D-16. This vulnerability
allows local users to overwrite the contents of any file, regardless
of file ownership, and can be used to obtain root access to the system.
CIAC continues to recommend that the expreserve utility be disabled
until the appropriate patched version can be installed.

Disabling expreserve
--------------------
To prevent use of the expreserve utility, execute the following command
as root:

/bin/chmod a-x /usr/lib/expreserve

The expreserve command normally is used to recover editor files when
vi, ex, or edit terminate unexpectedly. Disabling expreserve will
disable this recovery feature. Users of these editors should be
advised of this temporary change and encouraged to save their work
frequently.

Patching Solaris 2.x (SunOS 5.x)
--------------------------------
Sun Microsystems has released three Solaris 2.x expreserve patches:

Checksums
Patch ID Solaris Version /usr/bin/sum /usr/ucb/sum
--------- --------------- ------------ ------------
101119-01 Solaris 2.0 61863 54 47944 27
101089-01 Solaris 2.1 4501 54 07227 27
101090-01 Solaris 2.2 44985 54 02491 27

These patches, along with all other Sun security patches, are
available both through your local Sun Answer Center and anonymous
ftp. In the U.S., ftp to ftp.uu.net and retrieve the patches from the
directory /systems/sun/sun-dist. In Europe, ftp to mcsun.eu.net and
retrieve the patches from the /sun/fixes directory.

After retrieving a patch, its checksum may be verified using the sum
command. Note that Sun Microsystems occasionally updates patch files,
resulting in a changed checksum. Should you find that your checksums
differ, please contact CIAC or Sun Microsystems for verification
before installing the patch.

To install the patch on your system, follow the instructions contained
in the README file that accompanies the patch.

For additional information or assistance, please contact CIAC at
(510)422-8193 or send E-mail to ciac@llnl.gov. FAX messages to
(510)423-8002.

Previous CIAC bulletins and other information are available via
anonymous FTP from irbis.llnl.gov (IP address 128.115.19.60).

CIAC wishes to acknowledge the contributions of Sun Microsystems in
the preparation of this bulletin.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

INFORMATION BULLETIN

Wide-spread Attacks on Anonymous FTP Servers

July 15, 1993 1100 PDT Number D-19
__________________________________________________________________________
PROBLEM: Wide-spread abuse of anonymous FTP servers.
PLATFORM: All systems supporting TCP/IP networking and anonymous FTP.
DAMAGE: Unauthorized access to data, denial of service.
SOLUTION: Verify that anonymous FTP has been properly configured.
__________________________________________________________________________

Critical Information about Attacks on Anonymous FTP Servers

The CERT Coordination Center has released the enclosed advisory
describing a large number of attacks on improperly configured
anonymous FTP servers. The attacks described can result in compromise
of the system, excessive use of disk space resulting in denial of
service, or the transfer of sensitive or copyrighted information.
CIAC recommends that sites examine local systems to ensure that any
operating FTP servers are configured in a secure fashion.

Please note that while the CERT Advisory primarily addresses the
configuration of anonymous FTP on UNIX systems, a number of other
operating systems also support FTP servers, including OpenVMS using
packages such as MultiNet, and MS-DOS and Macintosh systems using
communications software such as NCSA Telnet or FTPd. The
configuration of FTP servers on these machines also requires careful
attention in order to avoid unauthorized or undesired use.

CIAC recommends the following guidelines for the configuration of
FTP servers:

1. If a system has no need to provide FTP service for other
machines on the network, the server should be disabled. This
will prevent unauthorized access to the system using FTP.

For example, to disable NCSA Telnet's FTP server, place the
statement "ftp=no" in the configuration file config.tel. On
most UNIX systems, removing the line for ftpd from the file
/etc/inetd.conf and then restarting inetd will disable the FTP
server.

2. If an FTP server is necessary, the need for anonymous service
should be evaluated. Anonymous FTP allows access to some of
the system's file space without requiring a password for
authentication, and unless carefully controlled can lead to
abuse of the system. If an anonymous FTP server is not
required on a particular host, that feature should be disabled.

Both MultiNet on OpenVMS systems and the FTP software on most
UNIX systems disable anonymous service by default. An account
with username "ftp" ("ANONYMOUS" in MultiNet) must be created
before anonymous logins will be accepted. The converse is true
of NCSA Telnet; unauthenticated logins are accepted by default
when the FTP server is enabled. A file containing authorized
usernames and passwords must be created using the telpass
utility in order to disable anonymous connections.

3. If an anonymous FTP server is necessary, the access of
anonymous connections should be restricted to a carefully
controlled number of files and the ability of a remote user to
store files on the server should be disabled or limited.

For example, the Macintosh program FTPd allows access controls
to be specified for each user, including anonymous users. The
set of accessible drives, folders, and files that a user is
permitted to work with, as well as the operations that they
may perform, can be carefully controlled, thus avoiding
unwanted or unauthorized access.

For additional information or assistance with the configuration of a
specific FTP server, please contact CIAC at (510) 422-8193 or send
E-mail to ciac@llnl.gov. FAX messages to (510) 423-8002.

[Beginning of CERT Advisory]
===========================================================================
CA-93:10 CERT Advisory
July 14, 1993
Anonymous FTP Activity

---------------------------------------------------------------------------

The CERT Coordination Center has been receiving a continuous stream of
reports from sites that are experiencing unwanted activities within their
anonymous FTP areas. We recognize that this is not a new problem, and we
have been striving to handle requests for assistance on a one-to-one basis
with the reporting administrator. However, since this activity does not seem
to be diminishing, CERT believes that a broad distribution of information
concerning this problem and corresponding solution suggestions should help
to address the widespread nature of this activity.

We are seeing three types of activity regarding anonymous FTP areas.

A. Improper configurations leading to system compromise.

B. Excessive transfer of data causing deliberate over-filling of
disk space thus leading to denial of service.

C. Use of writable areas to transfer copyrighted software and other
sensitive information.

This advisory provides an updated version of the anonymous FTP configuration
guidelines that is available from CERT. The purpose of these guidelines is
to assist system administrators at sites that offer anonymous FTP services.
These guidelines are intended to aid a system administrator in configuring
anonymous FTP capabilities so as to minimize unintended use of services or
resources. Systems administrators should be aware that anonymous FTP
capabilities should be configured and managed according to the policies
established for their site.

You may obtain future copies of these guidelines through anonymous FTP from
cert.org in /pub/tech_tips/anonymous_ftp.

---------------------------------------------------------------------------


ANONYMOUS FTP CONFIGURATION GUIDELINES

Anonymous FTP can be a valuable service if correctly configured and
administered. The first section of this document provides general guidance in
initial configuration of an anonymous FTP area. The second section addresses
the issues and challenges involved when a site wants to provide writable
directories within their anonymous FTP areas. The third section provides
information about previous CERT advisories related to FTP services.

The following guidelines are a set of suggested recommendations that have been
beneficial to many sites. CERT recognizes that there will be sites that have
unique requirements and needs, and that these sites may choose to implement
different configurations.

I. Configuring anonymous FTP

A. FTP daemon

Sites should ensure that they are using the most recent version
of their FTP daemon.

B. Setting up the anonymous FTP directories

The anonymous FTP root directory (~ftp) and its subdirectories
should not be owned by the ftp account or be in the same group as
the ftp account. This is a common configuration problem. If any of
these directories are owned by ftp or are in the same group as the
ftp account and are not write protected, an intruder will be able to
add files (such as a .rhosts file) or modify other files. Many sites
find it acceptable to use the root account. Making the ftp root
directory and its subdirectories owned by root, part of the system
group, and protected so that only root has write permission will help
to keep your anonymous FTP service secure.

Here is an example of an anonymous FTP directory setup:

drwxr-xr-x 7 root system 512 Mar 1 15:17 ./
drwxr-xr-x 25 root system 512 Jan 4 11:30 ../
drwxr-xr-x 2 root system 512 Dec 20 15:43 bin/
drwxr-xr-x 2 root system 512 Mar 12 16:23 etc/
drwxr-xr-x 10 root system 512 Jun 5 10:54 pub/

Files and libraries, especially those used by the FTP daemon and
those in ~ftp/bin and ~ftp/etc, should have the same protections
as these directories. They should not be owned by ftp or be in the
same group as the ftp account; and they should be write protected.

C. Using proper password and group files

We strongly advise that sites not use the system's /etc/passwd file as
the password file or the system's /etc/group as the group file in the
~ftp/etc directory. Placing these system files in the ~ftp/etc
directory will permit intruders to get a copy of these files.
These files are optional and are not used for access control.

We recommend that you use a dummy version of both the ~ftp/etc/passwd
and ~ftp/etc/group files. These files should be owned by root. The
dir command uses these dummy versions to show owner and group
names of the files and directories instead of displaying arbitrary
numbers.

Sites should make sure that the ~/ftp/etc/passwd file contains no
account names that are the same as those in the system's /etc/passwd
file. These files should include only those entries that are relevant
to the FTP hierarchy or needed to show owner and group names. In
addition, ensure that the password field has been cleared. The
examples below show the use of asterisks (*) to clear the password
field.

Below is an example of a passwd file from the anonymous FTP area on
cert.org:

ssphwg:*:3144:20:Site Specific Policy Handbook Working Group::
cops:*:3271:20:COPS Distribution::
cert:*:9920:20:CERT::
tools:*:9921:20:CERT Tools::
ftp:*:9922:90:Anonymous FTP::
nist:*:9923:90:NIST Files::

Here is an example group file from the anonymous FTP area on cert.org:

cert:*:20:
ftp:*:90:


II. Providing writable directories in your anonymous FTP configuration

There is a risk to operating an anonymous FTP service that permits
users to store files. CERT strongly recommends that sites do not
automatically create a "drop off" directory unless thought has been
given to the possible risks of having such a service. CERT has received
many reports where these directories have been used as "drop off"
directories to distribute bootlegged versions of copyrighted software or
to trade information on compromised accounts and password files. CERT
has also received numerous reports of files systems being maliciously
filled causing denial of service problems.

This section discusses three ways to address these problems. The first is
to use a modified FTP daemon. The second method is to provide restricted
write capability through the use of special directories. The third method
involves the use of a separate directory.

A. Modified FTP daemon

If your site is planning to offer a "drop off" service, CERT suggests
using a modified FTP daemon that will control access to the "drop off"
directory. This is the best way to prevent unwanted use of writable
areas. Some suggested modifications are:

1. Implement a policy where any file dropped off cannot
be accessed until the system manager examines the file
and moves it to a public directory.
2. Limit the amount of data transferred in one session.
3. Limit the overall amount of data transferred based on
available disk space.
4. Increase logging to enable earlier detection of abuses.

For those interested in modifying the FTP daemon, source code is
usually available from your vendor. Public domain sources are
available from:

wuarchive.wustl.edu ~ftp/packages/wuarchive-ftpd
ftp.uu.net ~ftp/systems/unix/bsd-sources/libexec/ftpd
gatekeeper.dec.com ~ftp/pub/DEC/gwtools/ftpd.tar.Z

The CERT Coordination Center has not formally reviewed, evaluated,
or endorsed the FTP daemons described. The decision to use the FTP
daemons described is the responsibility of each user or organization,
and we encourage each organization to thoroughly evaluate these
programs before installation or use.

B. Using protected directories

If your site is planning to offer a "drop off" service and is unable
to modify the FTP daemon, it is possible to control access by using a
maze of protected directories. This method requires prior coordination
and cannot guarantee protection from unwanted use of the writable FTP
area, but has been used effectively by many sites.

Protect the top level directory (~ftp/incoming) giving only execute
permission to the anonymous user (chmod 751 ~ftp/incoming). This will
permit the anonymous user to change directory (cd), but will not allow
the user to view the contents of the directory.

drwxr-x--x 4 root system 512 Jun 11 13:29 incoming/

Create subdirectories in the ~ftp/incoming using names known only
between your local users and the anonymous users that you want to
have "drop off" permission. The same care used in selecting passwords
should be taken in selecting these subdirectory names because the
object is to choose names that cannot be easily guessed. Please do not
use our example directory names of jAjwUth2 and MhaLL-iF.

drwxr-x-wx 10 root system 512 Jun 11 13:54 jAjwUth2/
drwxr-x-wx 10 root system 512 Jun 11 13:54 MhaLL-iF/

This will prevent the casual anonymous FTP user from writing files in
your anonymous FTP file system. It is important to realize that this
method does not protect a site against the result of intentional or
accidental disclosure of the directory names. Once a directory name
becomes public knowledge, this method provides no protection at all
from unwanted use of the area. Should a name become public, a site
may choose to either remove or rename the writable directory.

C. Using a single disk drive

If your site is planning to offer a "drop off" service and is
unable to modify the FTP daemon, it may be desirable to limit
the amount of data transferred to a single file system mounted
as ~ftp/incoming.

If possible, dedicate a disk drive and mount it as ~ftp/incoming.
If this dedicated disk becomes full, it will not cause a denial
of service problem.

The system administrator should monitor this directory (~ftp/incoming)
on a continuing basis to ensure that it is not being misused.


III. Related CERT Advisories

The following CERT Advisories directly relate to FTP daemons or impact
on providing FTP service:

CA-93:06.wuarchive.ftpd.vulnerability
CA-92:09.AIX.anonymous.ftp.vulnerability
CA-88:01.ftpd.hole

Past advisories are available for anonymous FTP from cert.org.


Copyright (c) Carnegie Mellon University 1993



---------------------------------------------------------------------------
[End of CERT Advisory]

Previous CIAC Bulletins and other information are available via
anonymous FTP from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

INFORMATION BULLETIN

Summary of SunOS Security Patches

August 6, 1993 1200 PDT Number D-20
__________________________________________________________________________
PROBLEM: Security vulnerabilities in all versions of SunOS.
PLATFORM: All Sun Microsystems workstations.
DAMAGE: Unauthorized access to system and files, denial of service.
SOLUTION: Apply appropriate security patches.
__________________________________________________________________________

Critical Information about SunOS Security Patches

This bulletin is an update to CIAC Bulletin C-29.

CIAC has compiled a list of all security related patches currently available
from Sun Microsystems. The patches have been grouped by SunOS version and
are detailed below. CIAC recommends the installation of any applicable
patches that either are not currently present on a system or are present in
the form of an older version of the patch.

Sun security patches are available through both your Sun Answer Center and
anonymous FTP. In the U.S., ftp to ftp.uu.net (IP 192.48.96.9) and retrieve
the patches from the directory /systems/sun/sun-dist. In Europe, ftp to
mcsun.eu.net (IP 192.16.202.1) and retrieve the patches from the /sun/fixes
directory. The patches are contained in compressed tarfiles with filenames
based on the ID number of the patch (e.g. patch 100085-03 is contained in the
file 100085-03.tar.Z), and must be retrieved using FTP's binary transfer
mode.

After obtaining the patches, compute the checksum of each compressed tarfile
and compare with the values indicated below. For example, the command
"/usr/bin/sum 100085-03.tar.Z" should return "44177 740". Please note that
Sun Microsystems occasionally updates patch files, resulting in a changed
checksum. If you should find a checksum that differs from those listed
below, please contact Sun Microsystems or CIAC for verification before using
the patch.

The patches may be extracted from the compressed tarfiles using the commands
uncompress and tar. For example, to extract patch 100085-03 from the
compressed tarfile 100085-03.tar.Z, execute the commands "uncompress
100085-03.tar.Z" and "tar xvf 100085-03.tar".

For specific instructions regarding the installation of a particular patch,
consult the README file accompanying each patch. As multiple patches may
affect the same files, it is recommended that patches be installed
chronologically by revision date, with the exception of patches for which an
explicit order is specified.


=======================
SunOS 5.2 (Solaris 2.2)
=======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
101090-01 28-Jun-93 44985 54 expreserve can overwrite any file


=======================
SunOS 5.1 (Solaris 2.1)
=======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100833-02 12-Jan-93 24412 309 C2 auditing missing in some programs
100840-01 12-Jan-93 25050 220 sendmail bypasses mailhost
100884-01 12-Feb-93 63299 5220 Security fixes for sun4m machines
101089-01 28-Jun-93 4501 54 expreserve can overwrite any file


=======================
SunOS 5.0 (Solaris 2.0)
=======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100723-01 24-Aug-92 49406 2 Incorrect permissions after install
101119-01 28-Jun-93 61863 54 expreserve can overwrite any file


===========
SunOS 4.1.3
===========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100448-01 10-Dec-91 29285 5 OpenWindows 3.0 loadmodule hole
100478-01 14-Feb-92 64588 58 OpenWindows 3.0 xlock vulnerability
100296-04 18-Jun-92 42492 40 File systems exported incorrectly
100507-04 3-Sep-92 57590 61 tmpfs file system vulnerability
100372-02 8-Sep-92 22739 712 tfs fails under C2
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100564-05 11-Nov-92 00115 824 C2 jumbo patch
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100623-03 11-Dec-92 56063 141 NFS file handles can be guessed
100173-10 7-Jan-93 48086 788 NFS jumbo patch
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100891-01 19-Feb-93 33195 3075 Netgroup and xlock vulnerabilities
100224-06 5-Mar-93 57647 54 mail and rmail can invoke root shells
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


===========
SunOS 4.1.2
===========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100448-01 10-Dec-91 29285 5 OpenWindows 3.0 loadmodule hole
100478-01 14-Feb-92 64588 58 OpenWindows 3.0 xlock vulnerability
100630-01 18-May-92 28074 39 Environment variables vulnerability
100633-01 22-May-92 33264 20 Environment variables with Sun's ARM
100296-04 18-Jun-92 42492 40 File systems exported incorrectly
100376-04 16-Jul-92 12884 100 Integer division vulnerability
100507-04 3-Sep-92 57590 61 tmpfs file system vulnerability
100372-02 8-Sep-92 22739 712 tfs fails under C2
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100564-05 11-Nov-92 00115 824 C2 jumbo patch
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100623-03 11-Dec-92 56063 141 NFS file handles can be guessed
100173-10 7-Jan-93 48086 788 NFS jumbo patch
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100224-06 5-Mar-93 57647 54 mail and rmail can invoke root shells
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


===========
SunOS 4.1.1
===========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100125-05 8-Jul-91 41964 164 telnet permits password capture
100424-01 12-Nov-91 63070 50 NFS file handles can be guessed
100448-01 10-Dec-91 29285 5 OpenWindows 3.0 loadmodule hole
100478-01 14-Feb-92 64588 58 OpenWindows 3.0 xlock vulnerability
100630-01 18-May-92 28074 39 Environment variables vulnerability
100633-01 22-May-92 33264 20 Environment variables with Sun's ARM
100296-04 18-Jun-92 42492 40 File systems exported incorrectly
100376-04 16-Jul-92 12884 100 Integer division vulnerability
100507-04 3-Sep-92 57590 61 tmpfs file system vulnerability
100372-02 8-Sep-92 22739 712 tfs fails under C2
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100201-06 5-Nov-92 13145 164 C2 jumbo patch
100267-09 6-Nov-92 55338 5891 Netgroup membership check fails
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100173-10 7-Jan-93 48086 788 NFS jumbo patch
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100224-06 5-Mar-93 57647 54 mail and rmail can invoke root shells
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


=========
SunOS 4.1
=========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100101-02 7-Aug-90 42872 34 ptrace security vulnerability
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100125-05 8-Jul-91 41964 164 telnet permits password capture
100630-01 18-May-92 28074 39 Environment variables vulnerability
100376-04 16-Jul-92 12884 100 Integer division vulnerability
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100201-06 5-Nov-92 13145 164 C2 jumbo patch
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100121-09 24-Feb-93 57589 360 NFS jumbo patch
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


======================
SunOS 4.0.3 and 4.0.3c
======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100100-01 30-Jul-90 43821 588 sendmail permits root level access
100101-02 7-Aug-90 42872 34 ptrace security vulnerability
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100125-05 8-Jul-91 41964 164 telnet permits password capture
100383-06 26-Jan-93 58984 121 rdist can create setuid root files


============
SunOS 4.0.2i
============
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100108-01 22-Aug-90 50309 146 sendmail security vulnerability


=====================
SunOS 4.0.1 and 4.0.2
=====================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability


For additional information or assistance, please contact CIAC at
(510) 423-9878 or send E-mail to ciac@llnl.gov. FAX messages to
(510) 423-8002.

Previous CIAC Bulletins and other information are available via anonymous
FTP from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending email to
docserver@first.org with an empty subject line and a message body containing
the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, product, or
process disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products, process,
or service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.

_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Novell NetWare LOGIN.EXE Security Patch

September 7, 1993 1140 PDT Number D-21
________________________________________________________________________
PROBLEM: A security vulnerability has been discovered in the login
procedure of NetWare 4.x
PLATFORM: PC/MS-DOS with Novell NetWare 4.x
DAMAGE: User accounts may be readily compromised
SOLUTION: Obtain and install replacement LOGIN.EXE v4.02
________________________________________________________________________
Critical Facts about the LOGIN.EXE vulnerability

CIAC has learned of a vulnerability within Novell's LOGIN.EXE program
which can allow compromise of user accounts. This vulnerability
affects NetWare 4.x only, and does not affect NetWare 2.x, 3.x, nor
Netware for Unix. Operation of the vulnerable LOGIN.EXE may cause the
inadvertant compromise of a user's name and password. Further details
of this vulnerability are contained in the text file included with the
patch.

The patch (LOGIN.EXE) and text file (SECLOG.TXT) are created by
executing the distribution file SECLOG.EXE, a self-extracting archive.
After extracting the files, the dir command should produce the
following output.

SECLOG EXE 166276 xx-xx-xx xx:xxx
LOGIN EXE 354859 08-25-93 11:43a
SECLOG TXT 5299 09-02-93 11:16a

To install the patch, follow the directions contained in the text file
SECLOG.TXT, and then instruct all your users to change their
passwords.

CIAC recommends that you replace your current LOGIN.EXE with the
security enhanced version as soon as possible. This patch is
available via anonymous FTP as SECLOG.EXE on irbis.llnl.gov in the
~pub/ciac/pcvirus directory, and on CIAC's bulletin board Felicia. It
can also be retrieved via anonymous FTP from first.org in the
~pub/software directory. This file is also available at no charge
through NetWare resellers, on NetWire in Library 14 of the NOVLIB
forum, or by calling 1-800-NETWARE. NetWare customers outside the
U.S. may call Novell at 303-339-7027 or 31-55-384279 or fax a request
for LOGIN.EXE v4.02 to Novell at 303-330-7655 or 31-55-434455. Include
company name, contact name, mailing address and phone number in the
fax request.


CIAC would like to acknowledge the efforts of Richard Colby of
Chem Nuclear Geotech, Inc. for discovering this vulnerability, and the
efforts of Novell in the resolution of this issue.

For additional information or assistance, please contact CIAC at
(510) 422-8193 or send e-mail to ciac@llnl.gov. FAX messages
to: (510) 423-8002.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.

_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Satan Bug Virus on MS-DOS computers

September 4, 1993 1000 PDT Number D-22
__________________________________________________________________________
NAME: Satan Bug virus
PLATFORM: MS-DOS/PC-DOS Computers
TYPE: Memory resident, polymorphic, encrypted
DAMAGE: Infects .COM, .EXE, .SYS, and .OVL files. Damages infected
files, makes LANs inaccessible by damaging the LAN drivers.
SYMPTOMS: Files grow at each infection, file dates change, files on LAN
file servers become inaccessible.
DETECTION: DataPhysician Plus 4.0B, Scan V106, Norton AntiVirus 2.1 with
August 1993 virus definitions.
__________________________________________________________________________
Critical Facts about the Satan Bug Virus

CIAC has been alerted that the Satan Bug virus, a new virus previously thought
to be contained, has been located at multiple sites in the "wild." The Satan
Bug virus is an encrypted, polymorphic virus that infects all .COM, .EXE,
.SYS, and .OVL files on MS-DOS/PC-DOS computers.

Infection Mechanism

When an infected file is run, the virus installs itself in memory, and then
infects COMMAND.COM. Thereafter, whenever an executable file is opened or
executed it is infected with the virus. Infected files grow in size from 2.9K
to 5.4K bytes, and the creation date is increased by 100 years.

Potential Damage

It does not appear that this virus does any intentional damage, but infected
files may be inoperative. In addition, the virus is not easily removed from
infected files, requiring that they be replaced with uninfected copies from
backup disks (See Appendix). The virus damages network drivers, making it
impossible for a machine to connect to a network and use network services.

Detection

Anti-virus scanners dated before August 1993 that use virus signature scanning
will not be able to recognize this virus. Anti-virus scanners that use file
signature scanning should be able to detect that the files have been changed,
but will not be able to name the virus. Most anti-virus scanner vendors are
updating their programs at this time, so scanners dated after August 1993
should be able to detect the virus by name. As of the release of this
bulletin, McAfee's SCANV 106 and Norton AntiVirus version 2.1 with the August
1993 virus definitions update are known to detect it. The DataPhysician Plus
package (VirHunt, ResScan) version 4.0B is in final testing and will be
available soon.

Warning

If you run an infected anti-virus scanner, nearly every executable file on
your disk will be infected. Virus scanners must open a file to scan it, and if
this virus is in memory, the act of opening the file for scanning will infect
it. Most scanners first check themselves to see if they are infected with a
virus, and display a "Virus Found" or "File Damaged" message when they start
up. If this happens, do not scan your disk with this scanner. Even if the
scanner claims that it can remove the virus from itself, don't scan your disk
with it. The memory resident portion of the virus will still infect your disk.

To scan a computer infected with a memory resident virus like the Satan Bug
virus, you must boot the computer with a clean (uninfected), locked floppy
that contains a clean version of the virus scanner software. Delete any
infected files the scanner finds, and replace them with fresh copies. See the
Appendix for more information.

For More Information or Assistance

If you require additional information or assistance, please contact CIAC at:
Phone: (510) 422-8193 / FTS
FAX: (510) 423-8002 / FTS
E-mail: ciac@llnl.gov.

Previous CIAC bulletins and other information are available via anonymous ftp from
irbis.llnl.gov (ip address 128.115.19.60).

CIAC wishes to thank Bill Kenny of DDI, Joe Wells of Symantec and David Proulx
of NAVCERT for their help in preparing this bulletin.

---------------------------------------------------------------------------
Appendix - Scanners, Encrypted Viruses and Removing Memory Resident Viruses

The following appendix answers some frequently asked questions about virus
scanners, encrypted viruses, and disinfecting hard disks.

Anti-Virus Scanners

Virus scanners use two different methods for detecting infected files;
scanning for virus signatures, and scanning for changes in executable files. A
signature scanner must have a string of bytes or signature that it can detect
in a file that uniquely identifies a virus. If a virus does not contain a
known signature, then the scanner will not detect it. File scanners look at a
files attributes, creation date and time, length, checksum, file header, and
other properties to determine if a file has changed. A file scanner can detect
a new virus, but can not tell what virus it is. Actually, a file scanner can
not tell if a file is infected by a virus only that a file has changed in some
way. However, any changes in executable files should be viewed with a lot of
suspicion. Few executable files rewrite themselves after installation. None of
the DOS utility programs (FORMAT, ASSIGN, etc.) should ever change during
normal use, so view changes there as a probable virus infection.

Problems Removing Encrypted Viruses

Encrypted viruses like the Satan Bug are particularly difficult to remove from
an infected program. Most viruses of this type attach themselves to the end of
a program, and then remove a small piece from the beginning of the program and
insert code there that causes the virus code to be run first. When the virus
code completes running, it executes the small piece of code it removed from
the beginning of the program and then continues with the original program.
That way, when you run an infected program, you will only notice a slight
hesitation at the beginning when the virus code runs, and then the infected
program runs like normal.

Encrypted viruses store this piece of the normal program within the virus code
and then encrypt the virus code. For an anti-virus program to be able to patch
an infected program, it must be able to decrypt the encrypted virus to find
the piece of missing code so that it can be put back where it belongs. The
Satan Bug virus has up to nine levels of encryption, the level being different
for each infection. Decrypting this much code is a very difficult process, so
most anti-virus programs are not expected to be able to repair programs
infected with the Satan Bug virus.

On the other hand, some file signature scanning programs may save enough of
the scanned files to be able to repair an infected program. The Data Physician
Plus package does save a sufficient amount of information to be able to repair
a program infected with the Satan Bug virus. However, you must have created
the file signature file before your program was infected. Again, if at all
possible, you should always replace infected files rather than repairing them
to insure that you have undamaged copies.

Disinfecting Hard Disks Infected With a Memory Resident Program Virus

In order to disinfect a disk infected with a memory resident program virus,
you first need to get the virus out of memory, then you need to scan the disk
with an uninfected copy of the Virus Scanner. To get the virus out of memory,
boot your computer with a clean, locked boot disk. Then you can scan the hard
disk using an anti-virus scanner, also located on a locked disk. The following
steps can be used to disinfect systems infected with memory resident program
viruses such as the Satan Bug. It is also applicable to non-memory resident
program viruses, but is not applicable to boot sector viruses and partition
table viruses which need additional steps.

1. You need a locked, uninfected emergency boot floppy disk that contains
the virus scanner, FORMAT.EXE, SYS.COM, and FDISK.COM, any disk
management software needed to access your hard disk such as
DiskManager. You also need simple CONFIG.SYS and AUTOEXEC.BAT files
that let you bring up your system in a limited way, and any
backup/restore software you may use. You need to have made this disk
before your system gets infected, or make it on some other uninfected
machine.
2. Boot the infected computer with the locked, uninfected floppy.
3. Run the copy of the virus scanner on the uninfected floppy and scan the
hard disks on the infected computer.
4. Once the scan has completed, delete any infected files the scanner
found and scan the disk again. Repeat this step until no more infected
or changed files are found. Alternately, you can let the scanner
disinfect all the files if it can, but this is not always possible
or preferable.
5. When the scanner indicates that the hard disk is clean: Restore the
system using the SYS command. This step replaces the invisible system
files, COMMAND.COM, and the boot sector.
6. Restore any deleted executables from your locked master disks
or backup sets.
7. Scan the disk again with your virus scanner. Note that at this point,
the scanner may detect changes in some files because you have copied in
new versions. If the scanner detects a virus, then delete the infected
file. Later you will need to scan your source disk for that infected
file, to see if it is infected as well.
8. Remove the emergency floppy and reboot the computer. Your computer
should boot up correctly.
9. Insert the emergency floppy and run the scanner again just to be sure
you have gotten every infected file.
10. Start scanning any floppy disks that may have been infected by your
computer. Keep in mind that the virus could have been active for months
before you discovered it.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.


VENDOR RESTRICTED
FOR DEPARTMENT OF ENERGY CRAY SITES ONLY
DO NOT DISTRIBUTE
_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Limited Distribution Bulletin

Cray UltraNet Security Vulnerability

September 5, 1993 1000 PDT Number D-23

For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send E-mail to ciac@llnl.gov. FAX
messages to (510) 423-8002 / FTS.

Cray Research Inc. provided the information used in this bulletin.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.


_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

INFORMATION BULLETIN

SCO Home Directory Vulnerability

September 17, 1993 1115 PDT Number D-24
__________________________________________________________________________
PROBLEM: Home directories for "dos" and "asg" accounts insecure.
PLATFORM: Systems using SCO Operating Systems (see list below).
DAMAGE: Unauthorized system access, including privileged access.
SOLUTION: Apply workaround described below.
__________________________________________________________________________

Critical Information about SCO Home Directory Vulnerability

CIAC has received information of a vulnerability in SCO Operating Systems
that may permit unauthorized access to the "dos" and "asg" accounts. The
following SCO products are affected by this vulnerability:

SCO UNIX System V/386 Release 3.2 Operating System
SCO UNIX System V/386 Release 3.2 Operating System Version 2.0
SCO UNIX System V/386 Release 3.2 Operating System version 4.x
SCO UNIX System V/386 Release 3.2 Operating System Version 4.0 with
Maintenance Supplement Version 4.1 and/or Version 4.2
SCO Network Bundle Release 4.x
SCO Open Desktop Release 1.x
SCO Open Desktop Release 2.0
SCO Open Desktop Lite Release 3.0
SCO Open Desktop Release 3.0
SCO Open Server Network System Release 3.0
SCO Open Server Enterprise System Release 3.0

The vulnerability results from the fact that the default home directories
for the "dos" and "asg" accounts are /tmp and /usr/tmp respectively, both
of which are writeable by all system users. This situation may allow
unauthorized users to gain access to these accounts and the files that
they own. The access may also be used to gain privileged access to the
system.

CIAC recommends that sites apply the following workaround to all affected
systems:

1. Log onto the system as "root".
2. Choose the following sequence of menu selections from the System
Administration Shell, which is invoked by typing "sysadmsh":

a. Accounts-->User-->Examine-->
[select the "dos" account]-->Identity
-->Home directory-->Create-->Path-->
[change it to /usr/dos instead of /tmp]-->confirm

b. Accounts-->User-->Examine-->
[select the "asg" account]-->Identity
-->Home directory-->Create-->Path-->
[change it to /usr/asg instead of /usr/tmp]-->confirm

Sites should also take steps to verify that the "dos" and "asg" accounts
have not been compromised. The following command will display recent
logins to either of the accounts:

last | egrep "dos|asg"

Should any login sessions be displayed, it is likely that the system has
been compromised. The modification times of the DOS binaries on the
system should also be examined for evidence of recent modifications. If
any evidence of compromise exists, CIAC strongly recommends that the DOS
package of Operating System Extended Utilities be removed and re-installed
using custom(ADM).

If you have further questions regarding this vulnerability, you may
contact SCO Support and ask for more information concerning the "Home
Directory Security Vulnerability." SCO may be reached as follows:

Electronic mail: support@sco.COM

USA/Canada: 6am-5pm Pacific Daylight Time (PDT)
-----------
1-800-347-4381 (voice)
1-408-427-5443 (fax)

Pacific Rim, Asia, and Latin American customers: 6am-5pm Pacific
------------------------------------------------ Daylight Time
(PDT)
1-408-425-4726 (voice)
1-408-427-5443 (fax)

Europe, Middle East, Africa: 9am-5:30pm British Standard Time (BST)
----------------------------
+44 (0)923 816344 (voice)
+44 (0)923 817781 (fax)

For additional information or assistance, please contact CIAC at
(510) 422-8193 or send E-mail to ciac@llnl.gov. FAX messages to
(510) 423-8002.

Previous CIAC Bulletins and other information are available via anonymous
FTP from irbis.llnl.gov (IP address 128.115.19.60).

CIAC would like to acknowledge the efforts of both Christopher Durham of
the Santa Cruz Operation and the CERT Coordination Center in the
resolution of this issue.

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending email to
docserver@first.org with an empty subject line and a message body containing
the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, product, or
process disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products, process,
or service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

ADVISORY NOTICE

Automated Scanning of Network Vulnerabilities

September 30, 1993 1000 PDT Number D-25
__________________________________________________________________________
PROBLEM: Automated attacks on networked computers.
PLATFORM: All systems supporting TCP/IP networking.
DAMAGE: Unauthorized access to information and computer resources.
SOLUTION: Examine machines for vulnerabilities detailed below and apply
fixes as needed.
__________________________________________________________________________

Critical Information about Automated Network Scanning Software

CIAC has learned that software allowing automated scanning of networked
computers for security vulnerabilities was recently made publicly
available on the Internet. The software package, known as ISS or Internet
Security Scanner, will interrogate all computers within a specified IP
address range, determining the security posture of each with respect to
several common system vulnerabilities. The software was designed as a
security tool for system and network administrators. However, given its
wide distribution and ability to scan remote networks, CIAC feels that it
is likely ISS will also be used to locate vulnerable hosts for malicious
reasons.

While none of the vulnerabilities ISS checks for are new, their
aggregation into a widely available automated tool represents a higher
level of threat to networked machines. CIAC has analyzed the operation of
the program and strongly recommends that administrators take this
opportunity to re-examine systems for the vulnerabilities described below.
Also detailed below are available security tools that may assist in the
detection and prevention of malicious use of ISS. Finally, common
symptoms of an ISS attack are outlined to allow detection of malicious
use.


ISS Vulnerabilities
-------------------

The following vulnerabilities are tested for by the ISS tool.
Administrators should verify the state of their systems and perform
corrective actions as indicated.

Default Accounts The accounts "guest" and "bbs", if they exist, should
have non-trivial passwords. If login access to these
accounts is not needed, they should be disabled by
placing a "*" in the password field and the string
"/bin/false" in the shell field in /etc/passwd. See
the system manual entry for "passwd" for more
information on changing passwords and disabling
accounts.

For example, the /etc/passwd entry for a disabled guest
account should resemble the following:

guest:*:2311:50:Guest User:/home/guest:/bin/false

lp Account The account "lp", if it exists, should not allow logins.
It should be disabled by placing a "*" in the password
field and the string "/bin/false" in the shell field in
/etc/passwd.

Decode Alias Mail aliases for decode and uudecode should be disabled
on UNIX systems. If the file /etc/aliases contains
entries for these programs, they should be disabled by
placing a "#" at the beginning of the line and then
executing the command "newaliases". Consult the manual
page for "aliases" for more information on UNIX mail
aliases.

A disabled decode alias should appear as follows:

# decode: "|/usr/bin/uudecode"

Sendmail The sendmail commands "wiz" and "debug" should be
disabled. This may be verified by executing the
following commands:

% telnet hostname 25
220 host Sendmail 5.65 ready at Wed, 29 Sep 93 20:28:46 PDT
wiz
You wascal wabbit! Wandering wizards won't win!
(or 500 Command unrecognized)
quit

% telnet hostname 25
220 host Sendmail 5.65 ready at Wed, 29 Sep 93 20:28:46 PDT
debug
500 Command unrecognized
quit

If the "wiz" command returns "Please pass, oh mighty
wizard", your system is vulnerable to attack. The
command should be disabled by adding a line to the
sendmail.cf configuration file containing the string:

OW*

If the "debug" command responds with the string
"200 Debug set", you should immediately obtain a newer
version of sendmail software from your vendor.

Anonymous FTP Anonymous FTP allows users without accounts to have
restricted access to certain directories on the system.
The availability of anonymous FTP on a given system may
be determined by executing the following commands:

% ftp hostname
Connected to hostname.
220 host FTP server ready.
Name (localhost:jdoe): anonymous
530 User anonymous unknown.
Login failed.

The above results indicate that anonymous FTP is not
enabled. If the system instead replies with the
string "331 Guest login ok" and then prompts for a
password, anonymous FTP access is enabled.

The configuration of systems allowing anonymous FTP
should be checked carefully, as improperly configured
FTP servers are frequently attacked. Refer to CIAC
Bulletin D-19 for more information.

NIS SunOS 4.x machines using NIS are vulnerable unless the
patch 100482 has been installed. See CIAC Bulletin
C-25 for more information regarding this patch.

NFS Filesystems exported under NFS should be mountable only
by a restricted set of hosts. The UNIX "showmount"
command will display the filesystems exported by a given
host:

% /usr/etc/showmount -e hostname
export list for hostname:
/usr hosta:hostb:hostc
/usr/local (everyone)

The above output indicates that this NFS server is
exporting two partitions: /usr, which can be mounted by
hosta, hostb, and hostc; and /usr/local which can be
mounted by anyone. In this case, access to the
/usr/local partition should be restricted. Consult the
system manual entry for "exports" or "NFS" for more
information.

rusers The UNIX rusers command displays information about
accounts currently active on a remote system. This may
provide an attacker with account names or other
information useful in mounting an attack. To check for
the availability of rusers information on a particular
machine, execute the following command:

% rusers -l hostname
hostname: RPC: Program not registered

If the above example had instead generated a list of
user names and login information, a rusers server is
running on the host. The server may be disabled by
placing a "#" at the beginning of the appropriate line
in the file /etc/inetd.conf and then sending the SIGHUP
signal to the inetd process. For example, a disabled
rusers entry might appear as follows:

#rusersd/2 dgram rpc/udp wait root /usr/etc/rusersd rusersd

rexd The UNIX remote execution server rexd provides only
minimal authentication and is easily subverted. It
should be disabled by placing a "#" at the beginning of
the rexd line in the file /etc/inetd.conf and then
sending the SIGHUP signal to the inetd process. The
disabled entry should resemble the following:

#rexd/1 stream rpc/tcp wait root /usr/etc/rexd rexd

Available Tools
---------------

There are several available security tools that may be used to prevent or
detect malicious use of ISS. They include the following:

SPI SPI, the Security Profile Inspector, will detect the
system vulnerabilities described above, as well as many
others. U.S. Government agencies interested in
obtaining SPI should send E-mail to spi@cheetah.llnl.gov
or call (510) 422-3881 for more information.

COPS The COPS security tool will also detect the
vulnerabilities described above. It is available via
anonymous FTP from ftp.cert.org in the directory
/pub/tools/cops/1.04.

ISS Running ISS on your systems will provide you with the
same information an attacker would obtain, allowing you
to correct vulnerabilities before they can be exploited.
Note that the current version of the software is known
to function poorly on some operating systems. If you
should have difficulty using the software, please contact
CIAC for assistance. ISS may be obtained via anonymous
FTP from ftp.uu.net in the directory
/usenet/comp.sources.misc/volume39/iss.

TCP Wrappers Access to most UNIX network services can be more closely
controlled using software known as a TCP wrapper. The
wrapper provides additional access control and flexible
logging features that may assist in both the prevention
and detection of network attacks. This software is
available via anonymous FTP from ftp.win.tue.nl in the
file /pub/security/tcp_wrappers_6.0.shar.Z


Detecting an ISS Attack
-----------------------

Given the wide distribution of the ISS tool, CIAC feels that remote
attacks are likely to occur. Such attacks can cause system warnings to be
generated that may prove useful in tracking down the source of the attack.
The most probable indicator of an ISS attack is a mail message sent to
"postmaster" on the scanned system similar to the following:

From: Mailer-Daemon@hostname (Mail Delivery Subsystem)
Subject: Returned mail: Unable to deliver mail
Message-Id: <9309291633.AB04591@>
To: Postmaster@hostname

----- Transcript of session follows -----
<<< VRFY guest
550 guest... User unknown
<<< VRFY decode
550 decode... User unknown
<<< VRFY bbs
550 bbs... User unknown
<<< VRFY lp
550 lp... User unknown
<<< VRFY uudecode
550 uudecode... User unknown
<<< wiz
500 Command unrecognized
<<< debug
500 Command unrecognized
421 Lost input channel to remote.machine

----- No message was collected -----

If you should receive such a message, it is likely that your machine and
others on your network have been scanned for vulnerabilities. You should
immediately contact your computer security officer or CIAC for assistance
in assessing the damage and taking corrective action.


For additional information or assistance, please contact CIAC at
(510) 422-8193 or send E-mail to ciac@llnl.gov. FAX messages to
(510) 423-8002.

Previous CIAC Bulletins and other information are available via anonymous
FTP from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending email to
docserver@first.org with an empty subject line and a message body containing
the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, product, or
process disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products, process,
or service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.

VENDOR RESTRICTED
FOR DEPARTMENT OF ENERGY CRAY SITES ONLY
DO NOT DISTRIBUTE
_______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Limited Distribution Bulletin

September 30, 1993 1500 PDT Number D-26

For additional information or assistance, please contact CIAC at
(510) 422-8193 / FTS or send E-mail to ciac@llnl.gov. FAX
messages to (510) 423-8002 / FTS.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close