exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Silicon Graphics Inc. Security Advisory 19950209-00-P

Silicon Graphics Inc. Security Advisory 19950209-00-P
Posted Sep 23, 1999

This advisory has the title colorview program allows reading of any file.

SHA-256 | 08e689b6d8c8c757ea20a963ebd8bb653df78ab733692521261a389519f632d6

Silicon Graphics Inc. Security Advisory 19950209-00-P

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________________
Silicon Graphics Inc. Security Advisory

Title: colorview program allows reading of any file
Number: 19950209-00-P
Date: February, 9, 1995
________________________________________________________________________________

Silicon Graphics provides this information freely to the SGI community
for its consideration, interpretation and implementation. Silicon Graphics
recommends that this information be acted upon as soon as possible.

Silicon Graphics will not be liable for any consequential damages arising
from the use of, or failure to use or use properly, any of the instructions
or information in this Security Advisory.
________________________________________________________________________________


A vulnerability has been discovered in the IRIX 5.1.x, 5.2, 6.0 and
6.0.1 operating systems which would allow the colorview program to be
used to view any file on the system.

SGI Engineering has investigated this issue and recommends the following
steps for neutralizing the exposure. It is HIGHLY RECOMMENDED that these
measures be done on ALL SGI systems running IRIX 5.1.x, 5.2, 6.0 and
6.0.1 . The issue will be permanently corrected in future releases of IRIX.


- --------------------------
- --- Immediate Solution ---
- --------------------------


To correct this issue, it is recommended to remove the setuid bit on the
colorview program. The following steps are provided to do this.


1) Become the root user on the system.

% /bin/su
Password:
#

2) Change the permissions on the colorview program to remove
the setuid permission.

# chmod u-s /usr/sbin/colorview


3) Verify the permissions and ownership to be as follows
after step 2.

# cd /usr/sbin
# ls -al colorview
-rwxr-xr-x 1 root sys 396376 Jan 18 18:40 colorview



- --------------------------
- --- Long Term Solution ---
- --------------------------


There is no patch for this issue. For 5.1.x and 5.2 versions, this has
been corrected in IRIX 5.3.



- ------------------------------------
- --- Further Information/Contacts ---
- ------------------------------------

For obtaining security information, patches or assistance, please
contact your SGI support provider.

For reporting new SGI security issues, email can be sent to
security-alert@sgi.com .



-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQCVAwUBL0ov39w7/Z6dLXhtAQEp5AQAp5TMbJbiSRjBQxYCJ2RQc0kU6D1AIb9j
mYGeQj2Bdre7VLB0oNRQMU1H/nG8V4edSUPeFckhzgk5AZn8kSqojJiGs1WVEEHM
jdU1bppt3PTaSwIVJDDEKk5+cs4xc5VaCrsK64K4ZI/PYMoqqyF8+lxyKs1KDCrG
KMpSwsrBulc=
=emdw
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close