Copy Link
Add to Bookmark
Report

CERT Advisory 032

eZine's profile picture
Published in 
CERT Advisory
 · 4 years ago

  


-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
CA-91:17 CERT Advisory
September 26, 1991
DECnet-Internet Gateway Vulnerability

- ---------------------------------------------------------------------------

The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received information concerning a vulnerability in the configuration of
the DECnet-Internet gateway software for Digital Equipment Corporation's
(DEC) ULTRIX versions 4.0, 4.1, and 4.2 on all Digital architectures.

Digital Equipment Corporation is aware of this problem and a resolution
for this vulnerability will be included in a future release. Digital
and the CERT/CC strongly recommend that sites exposed to this vulnerability
immediately institute the workaround detailed in this advisory.

- ---------------------------------------------------------------------------

I. Description

When installing the DECnet-Internet gateway software it is necessary to
create a guest account on the ULTRIX gateway host. By default, this
account has /bin/csh as its shell. By virtue of the guest account
having a valid shell, the DECnet-Internet gateway software can be
exploited to allow unauthorized root access.

II. Impact

Anyone using the DECnet-Internet gateway can gain unauthorized
root privileges on the ULTRIX gateway host.

III. Solution

This section describes a workaround for this vulnerability.

Disable the guest account by editing the /etc/passwd file and setting
the shell field for the guest account to /bin/false. Also, ensure the
guest account has the string "NoLogin" in the password field as detailed
in the DECnet-Internet installation manual.

Even if you have not installed or are not running the DECnet-
Internet gateway software, Digital recommends that you implement the
workaround solution stated above.

- ---------------------------------------------------------------------------
The CERT/CC wishes to thank R. Scott Butler of the Du Pont Company for
bringing this vulnerability to our attention and for his further
assistance with the temporary workaround.
- ---------------------------------------------------------------------------

If you believe that your system has been compromised, contact CERT/CC via
telephone or e-mail.

Computer Emergency Response Team/Coordination Center (CERT/CC)
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890

Internet E-mail: cert@cert.org
Telephone: 412-268-7090 24-hour hotline:
CERT/CC personnel answer 7:30a.m.-6:00p.m. EST/EDT,
on call for emergencies during other hours.

Past advisories and other computer security related information are available
for anonymous ftp from the cert.org (192.88.209.5) system.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMaMwyHVP+x0t4w7BAQECSgP/bcDdezJ2PX/B8dR2TCWBWibmU/XhXQvt
kwGoZ7rPauXKKVM3JfjMq/dz8VEenHI/9EJV3rAtAn5msWG/NGUB+cB19yo8k8Go
8ZJWYApXlAR0bwNtrXiOsri3Cj3MaCXnBO0TIph1i8xMbEB2Dqp/19QAKEhQRGqK
YgQP9urhWC8=
=cVic
-----END PGP SIGNATURE-----

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT