Copy Link
Add to Bookmark
Report

CERT Advisory 082

eZine's profile picture
Published in 
CERT Advisory
 · 4 years ago

  


-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
CERT(sm) Advisory CA-94:09
Original issue date: May 23, 1994
Last revised: August 30, 1996
Information previously in the README was inserted into the
advisory.

A complete revision history is at the end of this file.

Topic: /bin/login Vulnerability
- -----------------------------------------------------------------------------

The CERT Coordination Center has learned of a vulnerability in
/bin/login. This vulnerability potentially affects all IBM AIX 3
systems and Linux systems. At this time, we believe that only
IBM AIX 3 and Linux systems are at risk.

Included with this advisory is an appendix that lists the vendors who have
responded to our inquiries, and the status of their investigation into this
vulnerability report. We will update this advisory as we receive additional
information.

- -----------------------------------------------------------------------------

I. Description of IBM AIX vulnerability

A vulnerability exists in /bin/login on all IBM AIX 3 systems.

II. Impact of IBM AIX vulnerability

Remote users can obtain unauthorized root access on the affected
hosts.

III. Solution for IBM AIX vulnerability

IBM is working on an official fix, which is still under
development. The reference number for this fix is APAR IX44254.
Until you obtain the official fix from IBM, we encourage you to
apply the workaround or install the emergency fix below.

A. Workaround

The recommended workaround is to disable the rlogin daemon:

1. As root, edit /etc/inetd.conf
Comment out the line 'login ... rlogin'
2. Run 'inetimp'
3. Run 'refresh -s inetd'

B. Emergency fix

The emergency fix for the different levels of AIX 3
affected by this vulnerability is available via anonymous
FTP from software.watson.ibm.com:/pub/rlogin/rlogin.tar.Z.
Installation instructions are included in the README file
(which is included in rlogin.tar.Z).

Checksum information for rlogin.tar.Z:
BSD: 25285 317
SystemV: 13021 633 rlogin.tar.Z
MD5: MD5 (rlogin.tar.Z) = 803ee38c2e3b8c8c575e2ff5e921034c

C. Official fix

The official fix for this problem can be ordered as
APAR IX44254.

To order an APAR from IBM in the U.S., call 1-800-237-5511
and ask IBM to ship it as soon as it is available.
According to IBM, this fix will be available in
approximately two weeks. APARs may be obtained outside the
U.S. by contacting your local IBM representative.


IV. Description of Linux vulnerability

A vulnerability exists in /bin/login for Linux systems.

V. Impact of Linux vulnerability

Any user, remote or local, can obtain unauthorized root access on
the affected hosts.

VI. Solution for Linux vulnerability

A set of tools has been released by Florian La Roche <flla@stud.uni-sb.de>
under the name "NetKit." It is available via the FTP sites listed below.
An excerpt from the README provides the following general information:

This directory contains a collection of net source programs for LINUX.

NetKit-A A is the first character in the alphabet -> basic things
contains a collection of LINUX-specific programs and
several small utility programs found somewhere in the
Internet or on News
(contains also net-032 from Alan Cox)
NetKit-B B like BSD, even if we only think about LINUX
contains source code derived from NetBSD
NetKit-M M like mail
contains context diffs and some source code to make a
good mail system
NetKit-N N like news
contains context diffs for a good News system
(news readers and also INN for your own newsfeed)
NetKit-X X like eXtra
will maybe be necessary, if NetKit-A grows too large


sunacm.swan.ac.uk:/pub/misc/Linux/Networking/PROGRAMS/Packages
------------------------------------------------------------------------
MD5 (NetKit-A-0.05.bin.tar.gz) = afe45e04f359b0ff99e66cc58b4e758c
MD5 (NetKit-A-0.05.tar.gz) = a17fae1b58e1cf8a79aef30296f65672
MD5 (NetKit-A-0.06.bin.tar.gz) = e0f813427341b070ab9f8374ad721134
MD5 (NetKit-A-0.06.tar.gz) = adb00607cb2887c44f5aa8981fb8120b
MD5 (NetKit-B-0.04.bin.tar.gz) = ffe7099a0271a85eb22c78f7c3373bc6
MD5 (NetKit-B-0.04.tar.gz) = 156be1d3571b1681485b47255f7e202c
MD5 (NetKit-B-0.05.bin.tar.gz) = 3b270017ce28328c5596291e6d2687f0
MD5 (NetKit-B-0.05.tar.gz) = ba2327f741a265edc252e86b442a0a0d
MD5 (NetKit-M-0.01.tar.gz) = 392cbe6454965ad0d9e12f98af4cdd4a
MD5 (NetKit-N-0.01.tar.gz) = 55957726205a52621a15938c3bea593b

sunsite.unc.edu:/pub/Linux/system/Network/sunacm
------------------------------------------------------------------------
MD5 (NetKit-A-0.05.bin.tar.gz) = afe45e04f359b0ff99e66cc58b4e758c
MD5 (NetKit-A-0.05.tar.gz) = a17fae1b58e1cf8a79aef30296f65672
MD5 (NetKit-A-0.06.bin.tar.gz) = e0f813427341b070ab9f8374ad721134
MD5 (NetKit-A-0.06.tar.gz) = adb00607cb2887c44f5aa8981fb8120b
MD5 (NetKit-B-0.04.bin.tar.gz) = ffe7099a0271a85eb22c78f7c3373bc6
MD5 (NetKit-B-0.04.tar.gz) = 156be1d3571b1681485b47255f7e202c
MD5 (NetKit-B-0.05.bin.tar.gz) = 3b270017ce28328c5596291e6d2687f0
MD5 (NetKit-B-0.05.tar.gz) = ba2327f741a265edc252e86b442a0a0d
MD5 (NetKit-M-0.01.tar.gz) = 392cbe6454965ad0d9e12f98af4cdd4a
MD5 (NetKit-N-0.01.tar.gz) = 55957726205a52621a15938c3bea593b

To address the local access problem, we encourage you to install
a version of /bin/login that does not allow the -f option in the
form "-f<user>", but only allows this option in the form
"-f <user>", as two arguments. At this time, we do not know
which versions of login.c are vulnerable.


.............................................................................

Appendix

We have received feedback from the following, who indicated that their
products are not vulnerable:

Amdahl
Apple
BSD
BSDI
FreeBSD
Harris
HP
Linux
Motorola
NeXT
Pyramid
SCO
Sequent
SGI
Solbourne
Sony
Sun


CERT has received feedback from the following vendors, who have made
patches available to address the /bin/login vulnerability. Please
note that vendors sometimes update patch files. If you find that the
checksum is different, please contact the vendor.


IBM - Please see Sec. III, "Solution for IBM AIX vulnerability" for details.
Briefly--
Official patch: APAR IX44254.
Emergency fix: Available via anonymous FTP from:
software.watson.ibm.com:/pub/rlogin

This directory contains the latest available emergency
fix for APAR IX44254. As updates become available,
any new versions will be placed in this directory with
the name rlogin<#>.tar.Z with <#> being incremented
for each update. See the README.FIRST file in that
directory for details.

LINUX: - Please see Sec. VI, "Solution for Linux vulnerability" for details.
Briefly--
"Netkit" is available from
sunacm.swan.ac.uk:/pub/misc/Linux/Networking/PROGRAMS/Packages
sunsite.unc.edu:/pub/Linux/system/Network/sunacm


- ---------------------------------------------------------------------------
The CERT Coordination Center wishes to thank Axel Clauberg of
University of Cologne for reporting the IBM AIX problem, and
IBM for their assistance in responding to this problem.
- ---------------------------------------------------------------------------

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in Forum of Incident
Response and Security Teams (FIRST).

If you wish to send sensitive incident or vulnerability information to
CERT via electronic mail, CERT strongly advises that the e-mail be
encrypted. CERT can support a shared DES key, PGP (public key
available via anonymous FTP on info.cert.org), or PEM (contact CERT
for details).

Internet E-mail: cert@cert.org
Telephone: 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
and are on call for emergencies during other hours.

CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
USA

Past advisories, information about FIRST representatives, and other
information related to computer security are available for anonymous FTP from
info.cert.org.

Copyright 1994, 1995, 1996 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.

CERT is a service mark of Carnegie Mellon University.

===========================================================================
UPDATES

We are aware that there have been several /bin/login wrapper
programs posted as proposed workarounds for this vulnerability. None
of the wrappers that CERT has reviewed have fully addressed all
aspects of this vulnerability. CERT will not undertake any further
review of such wrappers. Instead, we encourage sites to apply the
appropriate workaround or patches available, as described in
CA-94:09.bin.login.vulnerability.

Frequently Asked Question about this CERT advisory:

Question: Why is rshd not mentioned in this advisory?
Answer: From the man page for RSH(1C):

rsh hostname [ -l username ] [ -n ] [ command ]

rsh connects to the specified hostname and
executes the specified command.
If you omit [ command ], instead of executing a
single command, rsh logs you in on the remote host
using rlogin(1C).

rsh hostname [ -l username ] [ -n ]

Exploitation of the vulnerability via rsh requires the
use of rlogind, which then invokes /bin/login.
Exploitation of this vulnerability by this method is
addressed by this advisory.

CERT/CC are not aware of any exploitation method for this
vulnerability via the following usage:

rsh hostname [ -l username ] [ -n ] command


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history

Aug. 30, 1996 Information previously in the README was inserted into the
advisory. The result is a major update to patch information in
Sections III and VI.
Mar. 29, 1996 Updates section - Removed duplicate information from the
"Frequently Asked Question" section
Feb. 02, 1995 Section III - Updated Linux patch information
May 27, 1994 Updates section - Included caveat concerning other /bin/login
wrapper programs and comments about rshd


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMiSVVHVP+x0t4w7BAQGBoQP9HUKDQbIdJrTomHR2mUZNoI/3sUefSb49
MbuIER9uJf5MiZooN0m1sPfl5o8dMpKA0vt8HdUf3xJviqj3J4+iT2aDt4xiYLL3
qg6uY7p9aRMRBDUyAj2ePku0WPk35Qqo3qZOQAJfAnX4lfKd5DnNuPerMq3ezBzc
56DZyZA2k60=
=fawd
-----END PGP SIGNATURE-----

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT