exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

d-21.novell-netware-login-patch

d-21.novell-netware-login-patch
Posted Sep 23, 1999

d-21.novell-netware-login-patch

SHA-256 | 0662b4429c1a85d112215f99ae00e21cf80c5a132348a3a4674d4181eeb4379d

d-21.novell-netware-login-patch

Change Mirror Download
        _______________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Novell NetWare LOGIN.EXE Security Patch

September 7, 1993 1140 PDT Number D-21
________________________________________________________________________
PROBLEM: A security vulnerability has been discovered in the login
procedure of NetWare 4.x
PLATFORM: PC/MS-DOS with Novell NetWare 4.x
DAMAGE: User accounts may be readily compromised
SOLUTION: Obtain and install replacement LOGIN.EXE v4.02
________________________________________________________________________
Critical Facts about the LOGIN.EXE vulnerability

CIAC has learned of a vulnerability within Novell's LOGIN.EXE program
which can allow compromise of user accounts. This vulnerability
affects NetWare 4.x only, and does not affect NetWare 2.x, 3.x, nor
Netware for Unix. Operation of the vulnerable LOGIN.EXE may cause the
inadvertant compromise of a user's name and password. Further details
of this vulnerability are contained in the text file included with the
patch.

The patch (LOGIN.EXE) and text file (SECLOG.TXT) are created by
executing the distribution file SECLOG.EXE, a self-extracting archive.
After extracting the files, the dir command should produce the
following output.

SECLOG EXE 166276 xx-xx-xx xx:xxx
LOGIN EXE 354859 08-25-93 11:43a
SECLOG TXT 5299 09-02-93 11:16a

To install the patch, follow the directions contained in the text file
SECLOG.TXT, and then instruct all your users to change their
passwords.

CIAC recommends that you replace your current LOGIN.EXE with the
security enhanced version as soon as possible. This patch is
available via anonymous FTP as SECLOG.EXE on irbis.llnl.gov in the
~pub/ciac/pcvirus directory, and on CIAC's bulletin board Felicia. It
can also be retrieved via anonymous FTP from first.org in the
~pub/software directory. This file is also available at no charge
through NetWare resellers, on NetWire in Library 14 of the NOVLIB
forum, or by calling 1-800-NETWARE. NetWare customers outside the
U.S. may call Novell at 303-339-7027 or 31-55-384279 or fax a request
for LOGIN.EXE v4.02 to Novell at 303-330-7655 or 31-55-434455. Include
company name, contact name, mailing address and phone number in the
fax request.


CIAC would like to acknowledge the efforts of Richard Colby of
Chem Nuclear Geotech, Inc. for discovering this vulnerability, and the
efforts of Novell in the resolution of this issue.

For additional information or assistance, please contact CIAC at
(510) 422-8193 or send e-mail to ciac@llnl.gov. FAX messages
to: (510) 423-8002.

PLEASE NOTE: Many users outside of the DOE and ESnet computing
communities receive CIAC bulletins. If you are not part of these
communities, please contact your agency's response team to report
incidents. Your agency's team will coordinate with CIAC. The Forum
of Incident Response and Security Teams (FIRST) is a world-wide
organization. A list of FIRST member organizations and their
constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line:
send first-contacts.

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, expressed or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, product, or process disclosed, or
represents that its use would not infringe privately owned rights.
Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or
favoring by the United States Government or the University of
California. The views and opinions of authors expressed herein do not
necessarily state or reflect those of the United States Government nor
the University of California, and shall not be used for advertising or
product endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close