what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

e-18.ciac-sun-automountd-patch

e-18.ciac-sun-automountd-patch
Posted Sep 23, 1999

e-18.ciac-sun-automountd-patch

SHA-256 | a1e5a8c24b1acb642b278383c5007970ad575829de5308008bb53a9b02fefc75

e-18.ciac-sun-automountd-patch

Change Mirror Download
            _____________________________________________________
The U.S. Department of Energy
Computer Incident Advisory Capability
___ __ __ _ ___
/ | /_\ /
\___ __|__ / \ \___
_____________________________________________________

INFORMATION BULLETIN

Sun Announces Patches for automountd Vulnerability


May 5, 1994 1200 PDT Number E-18
______________________________________________________________________________

PROBLEM: Vulnerability in Solaris 2.3 "automountd".
PLATFORM: Sun: Solaris 2.3 only. No other Sun OSs are affected.
DAMAGE: The vulnerability allows a user with an unprivileged account
to get root access on a Solaris 2.3 system.
SOLUTION: Retrieve and install the indicated patch.
______________________________________________________________________________

VULNERABILITY As of the date of this bulletin, Sun has had no reports of
ASSESSMENT: this hole being exploited, but the hole is serious, and CIAC
strongly recommends that this patch be installed.
______________________________________________________________________________

Critical Information about Sun Patches

CIAC has received information from Sun Microsystems regarding the availability
of Sun patch 101329-15 which will fix the automountd vulnerability. The
following text is from the Sun Microsystems Security Bulletin #00127a, which
supersedes bulletin #00127 issued on 5/4/94.

Patch 101329-15 fixes a bug in the Solaris 2.3 version of automountd
which allows a user with an unprivileged account on a 2.3 system to
gain root access.

No reports of this vulnerability being exploited have yet come to the
attention of this office. We nevertheless recommend that all affected
customers close this very serious security hole.

The automountd fix is bundled into the Solaris 2.3 jumbo NIS+ patch.
The first version of the patch to contain the security fix was
101329-10; but we recommend the installation of the latest version
(currently 101329-15).

This bug is not found in any other SunOS version, including Solaris x86.
The fix has been integrated into the upcoming Solaris 2.4 release.

NOTE: The original version of this bulletin, issued yesterday,
referred to version -13 of the patch as the latest. Shortly after
the bulletin was issued, however, version -15 (skipping -14) was
released, superseding the earlier version on SunSolve. For that
reason--and also to correct a last-minute typographical error--we
are issuing this revised bulletin. We apologize for the error and
regret any inconvenience.

To assist those who have already installed version -13 in deciding
whether to install -15 as well, we provide here a summary of the bugs
first fixed in the newer version. None specifically relate to security.

1163847 automountd doesn't work with Apollo pathnames which start with //
1153274 machine panics with recursive mutex_enter while using automounter
1156518 Cannot mount mvs/nfs mounts using autofs under Solaris 2.2 & 2.3.

The following table contains the checksums for the NIS+ patch (#101329-15).
______________________________________________________________________________
File Name BSD Checksum SVR4 Checksum MD5 Digital Signature
101329-15.tar.Z 55492 843 46189 1685 19AA042484727A5DE9CB21199858071A
______________________________________________________________________________
The checksums shown in the table are from the BSD-based checksum program
distributed with the system software (on 4.1.x, /bin/sum; on Solaris 2.x,
/usr/ucb/sum) and from the SVR4 version checksum program distributed with
Solaris 2.x (/usr/bin/sum). MD5 software can be retrieved via anonymous FTP
from irbis.llnl.gov in the file /pub/util/crypto/md5.tar (MD5 checksum of
md5.tar: B6B90CC7C56353FC643DF25B6F730D21).

Individuals with Sun support contracts may obtain these patches from their
local Sun Answer Center or from SunSolve Online. Security patches are also
available without a support contract via anonymous FTP from ftp.uu.net (IP
address 192.48.96.9) in the directory /systems/sun/sun-dist.
______________________________________________________________________________
CIAC would like to thank Mark Graff of Sun Microsystems for the information
contained in this advisory.
______________________________________________________________________________

For additional information or assistance, please contact CIAC:
Voice: 510-422-8193
FAX: 510-423-8002
STU-III: 510-423-2604
E-mail: ciac@llnl.gov

Previous CIAC Bulletins and other information are available via anonymous
FTP from irbis.llnl.gov (IP address 128.115.19.60).

CIAC has two self-subscribing mailing lists for its two types of electronic
publications: 1. Advisories (highest priority, time critical information) or
Bulletins (important computer security information) and 2. Notes (computer
security articles of general interest). Our mailing lists are managed by a
public domain software package called ListProcessor, which ignores E-mail
header subject lines. To subscribe (add yourself) to one of our mailing
lists,
send E-mail to: ciac-listproc@llnl.gov with the following request as the E-
mail
message body, substituting CIAC-BULLETIN or CIAC-NOTES for [list-name] and
valid information for the other items in parentheses:
subscribe [list-name] Full_Name Phone_number
______________________________________________________________________________

PLEASE NOTE: Many users outside of the DOE and ESnet computing communities
receive CIAC bulletins. If you are not part of these communities, please
contact your agency's response team to report incidents. Your agency's team
will coordinate with CIAC. The Forum of Incident Response and Security Teams
(FIRST) is a world-wide organization. A list of FIRST member organizations and
their constituencies can be obtained by sending email to docserver@first.org
with an empty subject line and a message body containing the line: send
first-contacts.

This document was prepared as an account of work sponsored by an agency of the
United States Government. Neither the United States Government nor the
University of California nor any of their employees, makes any warranty,
expressed or implied, or assumes any legal liability or responsibility for the
accuracy, completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately owned
rights. Reference herein to any specific commercial products, process, or
service by trade name, trademark manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation, or favoring
by the United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or reflect those
of the United States Government nor the University of California, and shall
not be used for advertising or product endorsement purposes.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close