Copy Link
Add to Bookmark
Report

Modernz 67b

eZine's profile picture
Published in 
Modernz
 · 5 years ago

  



<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
/* *\
/ * * \
/ * * \
/ * * \
/ * System Vulnerabilities * \
| * * |
| * * |
| * * |
| * Another Modernz Presentation * |
| * * |
\ * by * /
\ * Multiphage * /
\ * * /
\ * written 12-29-92 * /
\ * */
*******************************************************************************




<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
*******************************************************************************
The Modernz can be contacted at:

MATRIX BBS
WOK-NOW!
World of Kaos NOW!
World of Knowledge NOW!
St. Dismis Institute
- Sysops: Wintermute
Digital-demon
(908) 905-6691
(908) WOK-NOW!
(908) 458-xxxx
1200/2400/4800/9600
14400/19200/38400
Home of Modernz Text Philez

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

TANSTAAFL
Pheonix Modernz
The Church of Rodney
- Sysop: Tal Meta
(908) 830-TANJ
(908) 830-8265
Home of TANJ Text Philez

<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>

CyberChat
Sysop: Hegz
(908)506-6651
(908)506-7637
300/1200/2400/4800/9600
14400/19200/38400
Modernz Site
TLS HQ

<><><><><><><><><><><><><><<><<><><><><><><><><><><><><><><><><><><><><><><><><

BlitzKreig BBS
Home of TAP
(502)499-8933

<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>


===========================================================================
Altered System Binaries Incident

---------------------------------------------------------------------------

Information regarding a series of significant intrusion incidents on
the Internet. Systems administrators should be aware that many
systems on the Internet have been compromised due to this activity.
To identify whether your systems have been affected by the
activity we recommend that all system administrators check for the
signs of intrusion detailed in this advisory.

This advisory describes the activities that have been identified as
part of this particular incident. This does not address the
possibility that systems may have been compromised due to other,
unrelated intrusion activity.

---------------------------------------------------------------------------

I. Description

The intruders gain initial access to a host by discovering a
password for a user account on the system, exploiting a "+" in
the "/etc/hosts.equiv" file, or any ".rhosts" files on the
system. The intruder then connects to the system using rsh and
attempts to become root on the compromised system. An alias of
"decode" may used to gain root privileges.

II. Impact

Having gained root access on a system, the intruders may make
unauthorized changes to system binaries that can capture account
information for both local and remote systems. In addition, the
intruder adds "+ +" to any ".rhosts" files to which the intruder
has access.

III. Solution

A. Check your systems for signs of intrusion due to this incident.

1. Check the login, telnet, and uucpd binaries (for example,
"/bin/login", "/usr/ucb/telnet", and "/usr/etc/in.uucpd" on
Sun systems) against copies from distribution media. Note that
a check for creation or modification times and sizes is
not sufficient to assure that the files have not been modified.
The CERT/CC suggests that you compare the output of the
"sum(1)" or "cmp(1)" command on both the distribution and
installed versions of the binaries.

2. If the check from (A.1) indicates that your binaries have been
modified, check for the presence of a password
log file. Since the name of the logfile is often changed,
the name of the file should be obtained using the
"strings(1)" command on the Trojan login, uucpd, or telnet
binary. Examples of filenames used on other systems are:

"/usr/spool/. " (dot space)
"/var/spool/secretmail/.l"
"/var/spool/secretmail/.log"
"/var/spool/secretmail/.tty"
"/var/spool/secretmail/.lock"
"/usr/tmp/.log"
"/usr/spool/uucp/.sys"
"/usr/spool/uucppublic/.hushlogin"
"/usr/uucp/.sys"
"/mnt2/lost+found/.tmp/.log"
"/usr/spool/mqueue/.AFG001"

Verify that the contents of files found using the "strings(1)"
command do not contain valid username/password combinations.

3. Check for the presence of "+" in the "/etc/hosts.equiv"
file.

NOTE that Sun Microsystems installs the SunOS
operating system with a default "+" in the /etc/hosts.equiv
file for easy network access. This should be removed
unless required in your operating environment and protected
by a firewall network configuration. Leaving the "+"
intact will allow any non-root user on the Internet to
login to the system without a password.

4. Check the home directory for each entry in the "/etc/passwd"
file for the presence of a ".rhosts" file containing
"+ +" (plus space plus).

5. Assure that your "/etc/fstab", "/etc/inetd.conf", and
"/etc/exports" files have not been modified.

B. Take the following steps to secure your systems.

1. Save copies of the identified files to removable media and
remove any password log files as found in (A.2) above.

2. Replace any modified binaries with copies from
distribution media.

3. Remove the "+" entry from the "/etc/hosts.equiv"
file and the "+ +" (plus space plus) entry from any
".rhosts" files.

4. Change ownership of the "/etc" directory to userid "root"
if it is owned by "bin" (as distributed by Sun).

5. Change every password on the system and assure that the new
passwords are robust using a package such as Crack or Cops
(available via anonymous ftp from cert.org).

6. Inspect and restore any changes made to your "/etc/fstab",
"/etc/exports", or "/etc/inetd.conf" files. If any
modifications are found in these files, you will need to
unmount file systems and restart daemons once the files
have been restored. Alternatively the system could be
rebooted.

7. Remove the "decode" alias from your global mail aliases
file ("/etc/aliases" on Sun systems, "/usr/lib/aliases" on
other UNIX systems).
---------------------------------------------------------------------------


===========================================================================
Multiple SunOS Vulnerabilities Patched

---------------------------------------------------------------------------

Information concerning several vulnerabilities in the Sun Microsystems,
Inc. (Sun) operating system (SunOS). These vulnerabilities affect
all architectures and supported versions of SunOS including 4.1, 4.1.1,
and 4.1.2 on sun3, sun3x, sun4, sun4c, and sun4m. The patches have
been released as upgrades to three existing patch files.

Since application of these patches involves rebuilding your system kernel
file (/vmunix), it is recommended that you apply all patches simultaneously.
Use the procedure described below to apply the patches and rebuild the kernel.

Sun has provided patches for these vulnerabilities as updates to
Patch IDs 100173, 100376, and 100567. They are available through your local
Sun Answer Centers worldwide as well as through anonymous ftp from the
ftp.uu.net (137.39.1.9) system (in the /systems/sun/sun-dist directory).

Fix Patch ID Filename Checksum
NFS Jumbo 100173-08 100173-08.tar.Z 32716 562
Integer mul/div 100376-04 100376-04.tar.Z 12884 100
ICMP redirects 100567-02 100567-02.tar.Z 23118 13

Please note that Sun Microsystems sometimes updates patch files. If you
find that the checksum is different please contact Sun Microsystems or CERT
for verification.

---------------------------------------------------------------------------

NFS jumbo patch upgrade, SunOS 4.1, 4.1.1, 4.1.2, all architectures

I. Description

The upgrade to the NFS Jumbo patch addresses a vulnerability that
allows an intruder to become root using NFS. This vulnerability
affects all architectures and supported versions of SunOS.

II. Impact

A remote user may exploit this vulnerability to gain root access.

III. Solution

Extract the new files to be installed in the kernel.

Install the patch files in /sys/`arch -k`/OBJ as described in the
README file included in the patch file. Be sure to make a backup
of each of the files you are replacing before moving the patched
file to the /sys/`arch -k`/OBJ directory.

Config, make, and install the new kernel to include all patches
described in this advisory appropriate to your system. Reboot
each host using the appropriate kernel. Refer to the Systems and
Network Administration manual for instructions on building and
configuring a new custom kernel.


Integer mul/div patch upgrade, SunOS 4.1, 4.1.1, 4.1.2, SPARC architectures

I. Description

The integer mul/div patch upgrade addresses an additional problem with
the integer multiplication emulation code on SPARC architectures that
allows an intruder to become root. This vulnerability affects SPARC
architectures (sun4, sun4c, and sun4m) for all supported versions of
SunOS (4.1, 4.1.1, and 4.1.2).

II. Impact

A local user may exploit a bug in the emulation routines to gain
root access or crash the system.

III. Solution

Extract the new files to be installed in the kernel. Note that
this patch applies only to SPARC architectures.

Install the patch files in /sys/`arch -k`/OBJ as described in the
README file included in the patch file. Be sure to make a backup
of each of the files you are replacing before moving the patched
file to the /sys/`arch -k`/OBJ directory.

Config, make, and install the new kernel to include all patches
described in this advisory appropriate to your system. Reboot
each host using the appropriate kernel. Refer to the Systems and
Network Administration manual for instructions on building and
configuring a new custom kernel.


ICMP redirects patch upgrade, SunOS 4.1, 4.1.1, 4.1.2, all architectures

I. Description

The ICMP redirects patch addresses a denial of service vulnerability
with SunOS that allows an intruder to close existing network
connections to and from a Sun system. This vulnerability affects all
Sun architectures and supported versions of SunOS.

II. Impact

A remote user may deny network services on a Sun system.

III. Solution

Extract the new file to be installed in the kernel (the patch is
the same for all supported versions of SunOS).

Install the patch files in /sys/`arch -k`/OBJ as described in the
README file included in the patch file. Be sure to make a backup
of each of the files you are replacing before moving the patched
file to the /sys/`arch -k`/OBJ directory.

Config, make, and install the new kernel to include all patches
described in this advisory appropriate to your system. Reboot
each host using the appropriate kernel. Refer to the Systems and
Network Administration manual for instructions on building and
configuring a new custom kernel.

---------------------------------------------------------------------------

===========================================================================
VMS Monitor Vulnerability

---------------------------------------------------------------------------

Information concerning a potential vulnerability with Digital Equipment
Corporation's VMS Monitor. This vulnerability is present in V5.0 through
V5.4-2 but has been corrected in V5.4-3 through V5.5-1. The Software
Security Response Team at Digital has provided the following information
concerning this vulnerability.

NOTE: Digital suggests that customers who are unable to upgrade their
systems implement the workaround described below.

For additional information, please contact your local Digital Equipment
Corporation customer service representative.


Beginning of Text provided by Digital Equipment Corporation
==============================================================================
SSRT-0200 PROBLEM: Potential Security Vulnerability Identified in Monitor
SOURCE: Digital Equipment Corporation
AUTHOR: Software Security Response Team - U.S.
Colorado Springs USA

PRODUCT: VMS
Symptoms Identified On: VMS, Versions 5.0, 5.0-1, 5.0-2, 5.1, 5.1-B,
5.1-1, 5.1-2, 5.2, 5.2-1, 5.3,
5.3-1, 5.3-2, 5.4, 5.4-1, 5.4-2

*******************************************************
SOLUTION: This problem is not present in VMS V5.4-3
(released in October 1991) through V5.5-1
(released in July, 1992.)
*******************************************************
Copyright (c) Digital Equipment Corporation, 1992 All Rights Reserved.
Published Rights Reserved Under The Copyright Laws Of The United States.
-------------------------------------------------------------------------------
PROBLEM/IMPACT:
-------------------------------------------------------------------------------
Unauthorized privileges may be expanded to authorized users of a system
under certain conditions, via the Monitor utility. Should a system be
compromised through unauthorized access, there is a risk of potential
damage to a system environment. This problem will not permit unauthorized
access entry, as individuals attempting to gain unauthorized access will
continue to be denied through the standard VMS security mechanisms.
-------------------------------------------------------------------------------
SOLUTION:
-------------------------------------------------------------------------------
This potential vulnerability does not exist in VMS V5.4-3
(released in October 1991) and later versions of VMS through V5.5-1.

Digital strongly recommends that you upgrade to a minimum of VMS V5.4-3,
and further, to the latest release of VMS V5.5-1. (released in July, 1992)
------------------------------------------------------------------------------
INFORMATION:
-------------------------------------------------------------------------------
If you cannot upgrade at this time Digital recommends that you
implement a workaround (examples attached below) to avoid any potential
vulnerability.

As always, Digital recommends that you periodically review your system
management and security procedures. Digital will continue to review and
enhance the security features of its products and work with customers to
maintain and improve the security and integrity of their systems.
-------------------------------------------------------------------------------
WORKAROUND
-------------------------------------------------------------------------------
A suggested workaround would be to remove the installed image
SYS$SHARE:SPISHR.EXE via VMS INSTALL and/or restrict the use of
the MONITOR utility to "privileged" system administrators.
Below are the examples of doing both;

[1] To disable the MONITOR utility the image SYS$SHARE:SPISHR.EXE should be
deinstalled.

From a privileged account;

For cluster configurations;
---------------------------

$ MC SYSMAN
SYSMAN> SET ENVIRONMENT/CLUSTER
SYSMAN> DO INSTALL REMOVE SYS$SHARE:SPISHR.EXE
SYSMAN> DO RENAME SYS$SHARE:SPISHR.EXE SPISHR.HOLD
SYSMAN> EXIT

For non-VAXcluster configurations;
---------------------------------

$INSTALL
INSTALL>REMOVE SYS$SHARE:SPISHR.EXE
INSTALL>EXIT
$RENAME SYS$SHARE:SPISHR.EXE SPISHR.HOLD


[2] If you wish to restrict access to the MONITOR command so that only a
limited number of authorized (or privileged) persons are granted access
to the utility, one method might be to issue the following
example commands;

From a privileged account;

For cluster configurations;
---------------------------

$ MC SYSMAN
SYSMAN> SET ENVIRONMENT/CLUSTER
SYSMAN> DO INSTALL REMOVE SYS$SHARE:SPISHR.EXE
SYSMAN> DO SET FILE/ACL=(ID=*,ACCESS=NONE) SYS$SHARE:SPISHR.EXE
SYSMAN> DO SET FILE/ACL=(ID=SYSTEM,ACCESS=READ+EXECUTE) SYS$SHARE:SPISHR.EXE
SYSMAN> DO INSTALL ADD SYS$SHARE:SPISHR.EXE/OPEN/HEADER/SHARE/PROTECT
SYSMAN> EXIT
$
THIS WILL IMPACT the MONITOR UTILITY FOR REMOTE MONITORING.
LOCAL MONITORING WILL CONTINUE TO WORK FOR PERSONS HOLDING THE ID's
GRANTED ACL ACCESS.

see additional note(s) below

For non-VAXcluster configurations;
----------------------------------

$ INSTALL
INSTALL>REMOVE SYS$SHARE:SPISHR.EXE
INSTALL>EXIT
$ SET FILE /ACL=(ID=*,ACCESS=NONE) SYS$SHARE:SPISHR.EXE
$ SET FILE /ACL=(ID=SYSTEM,ACCESS=READ+EXECUTE) SYS$SHARE:SPISHR.EXE
$ INSTALL
INSTALL>ADD SYS$SHARE:SPISHR.EXE/OPEN/HEADER/SHARE/PROTECT
INSTALL>EXIT
$

IN THE ABOVE EXAMPLES, THE "SET FILE /ACL" LINE SHOULD BE REPEATED FOR
ALL ACCOUNTS THAT ARE REQUIRED/ALLOWED TO USE THE DCL MONITOR COMMAND.

NOTE: The ID -SYSTEM- is an example, and should be
substituted as necessary with valid user ID's that are
associated with accounts you wish to grant access to.

===========================================================================
End of Text provided by Digital Equipment Corporation


---------------------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT