exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

d-20.ciac-summary-sunos-patches

d-20.ciac-summary-sunos-patches
Posted Sep 23, 1999

d-20.ciac-summary-sunos-patches

systems | solaris
SHA-256 | e3da86e2fd993b9602bf0fd2975b6c38fb38be42c883e2500f617a5566fd2844

d-20.ciac-summary-sunos-patches

Change Mirror Download
          _____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________

INFORMATION BULLETIN

Summary of SunOS Security Patches

August 6, 1993 1200 PDT Number D-20
__________________________________________________________________________
PROBLEM: Security vulnerabilities in all versions of SunOS.
PLATFORM: All Sun Microsystems workstations.
DAMAGE: Unauthorized access to system and files, denial of service.
SOLUTION: Apply appropriate security patches.
__________________________________________________________________________

Critical Information about SunOS Security Patches

This bulletin is an update to CIAC Bulletin C-29.

CIAC has compiled a list of all security related patches currently available
from Sun Microsystems. The patches have been grouped by SunOS version and
are detailed below. CIAC recommends the installation of any applicable
patches that either are not currently present on a system or are present in
the form of an older version of the patch.

Sun security patches are available through both your Sun Answer Center and
anonymous FTP. In the U.S., ftp to ftp.uu.net (IP 192.48.96.9) and retrieve
the patches from the directory /systems/sun/sun-dist. In Europe, ftp to
mcsun.eu.net (IP 192.16.202.1) and retrieve the patches from the /sun/fixes
directory. The patches are contained in compressed tarfiles with filenames
based on the ID number of the patch (e.g. patch 100085-03 is contained in the
file 100085-03.tar.Z), and must be retrieved using FTP's binary transfer
mode.

After obtaining the patches, compute the checksum of each compressed tarfile
and compare with the values indicated below. For example, the command
"/usr/bin/sum 100085-03.tar.Z" should return "44177 740". Please note that
Sun Microsystems occasionally updates patch files, resulting in a changed
checksum. If you should find a checksum that differs from those listed
below, please contact Sun Microsystems or CIAC for verification before using
the patch.

The patches may be extracted from the compressed tarfiles using the commands
uncompress and tar. For example, to extract patch 100085-03 from the
compressed tarfile 100085-03.tar.Z, execute the commands "uncompress
100085-03.tar.Z" and "tar xvf 100085-03.tar".

For specific instructions regarding the installation of a particular patch,
consult the README file accompanying each patch. As multiple patches may
affect the same files, it is recommended that patches be installed
chronologically by revision date, with the exception of patches for which an
explicit order is specified.


=======================
SunOS 5.2 (Solaris 2.2)
=======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
101090-01 28-Jun-93 44985 54 expreserve can overwrite any file


=======================
SunOS 5.1 (Solaris 2.1)
=======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100833-02 12-Jan-93 24412 309 C2 auditing missing in some programs
100840-01 12-Jan-93 25050 220 sendmail bypasses mailhost
100884-01 12-Feb-93 63299 5220 Security fixes for sun4m machines
101089-01 28-Jun-93 4501 54 expreserve can overwrite any file


=======================
SunOS 5.0 (Solaris 2.0)
=======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100723-01 24-Aug-92 49406 2 Incorrect permissions after install
101119-01 28-Jun-93 61863 54 expreserve can overwrite any file


===========
SunOS 4.1.3
===========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100448-01 10-Dec-91 29285 5 OpenWindows 3.0 loadmodule hole
100478-01 14-Feb-92 64588 58 OpenWindows 3.0 xlock vulnerability
100296-04 18-Jun-92 42492 40 File systems exported incorrectly
100507-04 3-Sep-92 57590 61 tmpfs file system vulnerability
100372-02 8-Sep-92 22739 712 tfs fails under C2
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100564-05 11-Nov-92 00115 824 C2 jumbo patch
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100623-03 11-Dec-92 56063 141 NFS file handles can be guessed
100173-10 7-Jan-93 48086 788 NFS jumbo patch
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100891-01 19-Feb-93 33195 3075 Netgroup and xlock vulnerabilities
100224-06 5-Mar-93 57647 54 mail and rmail can invoke root shells
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


===========
SunOS 4.1.2
===========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100448-01 10-Dec-91 29285 5 OpenWindows 3.0 loadmodule hole
100478-01 14-Feb-92 64588 58 OpenWindows 3.0 xlock vulnerability
100630-01 18-May-92 28074 39 Environment variables vulnerability
100633-01 22-May-92 33264 20 Environment variables with Sun's ARM
100296-04 18-Jun-92 42492 40 File systems exported incorrectly
100376-04 16-Jul-92 12884 100 Integer division vulnerability
100507-04 3-Sep-92 57590 61 tmpfs file system vulnerability
100372-02 8-Sep-92 22739 712 tfs fails under C2
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100564-05 11-Nov-92 00115 824 C2 jumbo patch
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100623-03 11-Dec-92 56063 141 NFS file handles can be guessed
100173-10 7-Jan-93 48086 788 NFS jumbo patch
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100224-06 5-Mar-93 57647 54 mail and rmail can invoke root shells
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


===========
SunOS 4.1.1
===========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100125-05 8-Jul-91 41964 164 telnet permits password capture
100424-01 12-Nov-91 63070 50 NFS file handles can be guessed
100448-01 10-Dec-91 29285 5 OpenWindows 3.0 loadmodule hole
100478-01 14-Feb-92 64588 58 OpenWindows 3.0 xlock vulnerability
100630-01 18-May-92 28074 39 Environment variables vulnerability
100633-01 22-May-92 33264 20 Environment variables with Sun's ARM
100296-04 18-Jun-92 42492 40 File systems exported incorrectly
100376-04 16-Jul-92 12884 100 Integer division vulnerability
100507-04 3-Sep-92 57590 61 tmpfs file system vulnerability
100372-02 8-Sep-92 22739 712 tfs fails under C2
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100201-06 5-Nov-92 13145 164 C2 jumbo patch
100267-09 6-Nov-92 55338 5891 Netgroup membership check fails
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100173-10 7-Jan-93 48086 788 NFS jumbo patch
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100224-06 5-Mar-93 57647 54 mail and rmail can invoke root shells
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


=========
SunOS 4.1
=========
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100101-02 7-Aug-90 42872 34 ptrace security vulnerability
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100125-05 8-Jul-91 41964 164 telnet permits password capture
100630-01 18-May-92 28074 39 Environment variables vulnerability
100376-04 16-Jul-92 12884 100 Integer division vulnerability
100377-05 15-Sep-92 29141 1076 sendmail security holes
100103-11 29-Sep-92 19847 6 Permissions incorrect on many files
100567-04 27-Oct-92 15728 11 ICMP packets can be forged
100201-06 5-Nov-92 13145 164 C2 jumbo patch
100482-04 16-Nov-92 06594 342 ypserv will send NIS maps to anyone
100513-02 2-Dec-92 34315 483 Console can be redirected
100383-06 26-Jan-93 58984 121 rdist can create setuid root files
100452-28 29-Jan-93 07299 1688 cmdtool may reveal passwords
100305-11 12-Feb-93 38582 500 The lp daemon can delete system files
100121-09 24-Feb-93 57589 360 NFS jumbo patch
101080-01 9-Jun-93 45221 13 expreserve can overwrite any file


======================
SunOS 4.0.3 and 4.0.3c
======================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100100-01 30-Jul-90 43821 588 sendmail permits root level access
100101-02 7-Aug-90 42872 34 ptrace security vulnerability
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability
100184-02 14-Dec-90 06627 33 OpenWindows 2.0 vulnerability
100125-05 8-Jul-91 41964 164 telnet permits password capture
100383-06 26-Jan-93 58984 121 rdist can create setuid root files


============
SunOS 4.0.2i
============
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100108-01 22-Aug-90 50309 146 sendmail security vulnerability


=====================
SunOS 4.0.1 and 4.0.2
=====================
Patch ID Last Revised Checksum Description
--------- ------------ ---------- -------------------------------------
100085-03 5-Sep-90 44177 740 Sunview selection_svc vulnerability


For additional information or assistance, please contact CIAC at
(510) 423-9878 or send E-mail to ciac@llnl.gov. FAX messages to
(510) 423-8002.

Previous CIAC Bulletins and other information are available via anonymous
FTP from irbis.llnl.gov (IP address 128.115.19.60).

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations
and their constituencies can be obtained by sending email to
docserver@first.org with an empty subject line and a message body containing
the line: send first-contacts.

This document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, product, or
process disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products, process,
or service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views
and opinions of authors expressed herein do not necessarily state or reflect
those of the United States Government nor the University of California, and
shall not be used for advertising or product endorsement purposes.

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close