Copy Link
Add to Bookmark
Report

CERT Advisory 031

eZine's profile picture
Published in 
CERT Advisory
 · 4 years ago

  


-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
CA-91:15 CERT Advisory
September 10, 1991
Mac/PC NCSA Telnet Vulnerability

- ---------------------------------------------------------------------------

The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received information concerning a vulnerability in the default
configurations of National Center for Supercomputing Applications
(NCSA) Telnet for both the Macintosh and the PC. The vulnerability
also affects the version of NCSA Telnet with IBM 3270 terminal
emulation distributed by Clarkson University. Two workarounds are
available that correct this problem.

NCSA has committed to changing the default configurations in future
releases. Maintenance updates for both the Macintosh and the PC are
planned to be released in about 2 months.

NCSA provides two e-mail addresses for Telnet questions, comments,
and bug reports:

PC Telnet pctelnet@ncsa.uiuc.edu
Mac Telnet mactelnet@ncsa.uiuc.edu

- ---------------------------------------------------------------------------

I. Description

The default configuration of NCSA Telnet for both the Macintosh
and the PC has a serious vulnerability in its implementation of
an ftp server.

The default configuration file enables ftp via the "ftp=yes"
line. However, sites should be aware that ftp is also enabled
in the absence of any ftp statement in the configuration file.

II. Impact

Any Internet user can connect via ftp to a PC or Macintosh
running the default configuration of NCSA Telnet and gain
unauthorized read and write access to any of its files, including
system files.

III. Solution

Either disable ftp server functionality or provide password
protection as described below.

To disable the ftp server, add an "ftp=no" line in the
configuration file.

If the ftp server option is enabled (via either an "ftp=yes" line
in the configuration file or the absence of an ftp statement in the
configuration file), then the Telpass program (included with both
Mac and PC versions) can be used to provide password protection.
Telpass is used to enter usernames and encrypted passwords into a
password file. The configuration file specifies the name and
location of the password file in the "passfile=" statement. The
usage of Telpass is documented in Chapter 5 of version 2.4 of the
Macintosh version documentation and Chapter 7 of version 2.3 of the
PC version. Note that the documentation (as well as the package
itself) is available by anonymous ftp from ftp.ncsa.uiuc.edu
(141.142.20.50).

The instructions for enabling password protection differ between
the Macintosh and PC versions, but in both cases they involve
enabling the "passfile" option in the configuration file, and
creating usernames and encrypted passwords with the Telpass
program.

CERT/CC strongly urges all sites running NCSA Telnet to implement
one of these two workarounds.

- ---------------------------------------------------------------------------
The CERT/CC would like to thank NCSA and Clarkson University for their
assistance.
- ---------------------------------------------------------------------------

If you believe that your system has been compromised, contact CERT/CC via
telephone or e-mail.

Computer Emergency Response Team/Coordination Center (CERT/CC)
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890

Internet E-mail: cert@cert.org
Telephone: 412-268-7090 24-hour hotline:
CERT/CC personnel answer 7:30a.m.-6:00p.m. EDT,
on call for emergencies during other hours.

Past advisories and other computer security related information are available
for anonymous ftp from the cert.org (192.88.209.5) system.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMaMwwnVP+x0t4w7BAQGJggQAvw+moDqaIHmINzRRqQycq7SvisebO54k
XBR2qb1PlpX7eKKgc/UkkJfF02LOqjKge0VuGvTDrYBtVl34uRNrbxXb+X32bFFI
G2MIGDlc9bGSZJxfZp+8JT8n8zQeTXAmLocuuCaybFZK3qyyim9R1AA1NnWauriY
udIiwcC8WUY=
=d2WG
-----END PGP SIGNATURE-----

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT