************************************************************************** Security Bulletin 9304 DISA Defense Communications System February 8, 1993 Published by: DDN Security Coordination Center (SCC@NIC.DDN.MIL) 1-(800) 365-3642 DEFENSE DATA NETWORK SECURITY BULLETIN The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security Coordination Center) under DISA contract as a means of communicating information on network and host security exposures, fixes, and concerns to security and management personnel at DDN facilities. Back issues may be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.112.36.5] using login="anonymous" and password="guest". The bulletin pathname is scc/ddn-security-yynn (where "yy" is the year the bulletin is issued and "nn" is a bulletin number, e.g. scc/ddn-security-9304). ************************************************************************** + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + ! ! ! The following important advisory was issued by the Computer ! ! Emergency Response Team (CERT) and is being relayed unedited ! ! via the Defense Information Systems Agency's Security ! ! Coordination Center distribution system as a means of ! ! providing DDN subscribers with useful security information. ! ! ! + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + ----------------------------------------------------------------------------- CA-93:03 CERT Advisory February 3, 1993 SunOS File/Directory Permissions ----------------------------------------------------------------------------- The default permissions on a number of files and directories in SunOS 4.1, 4.1.1, 4.1.2, and 4.1.3 are set incorrectly. These problems are relevant for the sun3, sun3x, sun4, sun4c, and sun4m architectures. They have been fixed in SunOS 5.0. (Note that SunOS 5.0 is the operating system included in the Solaris 2.0 software distribution.) An updated patch to reset these permissions is available from Sun. CERT has seen an increasing number of attackers exploit these problems on systems, and we encourage sites to consider installing this patch. ----------------------------------------------------------------------------- I. Description File permissions on numerous files were set incorrectly in the distribution tape of 4.1.x. A typical example is a file that should have been owned by "root" and was set to be owned by "bin". Not all sites will need or want to install the patch for this problem. The decision of what user id should own most system files and directories depends on the administrative practices of the site. It is quite reasonable to run a system where the majority of files are owned by "bin" as long as the entire system is run in a manner consistent with that practice. As distributed, the SunOS configuration expects most system files to be owned by "root". The fact that some are not creates security problems. Therefore, sites that are running the SunOS versions listed above as distributed should install the patch described below. Sites that have made an informed choice to configure their system differently may instead want to review the patch script and consider which, if any, of the changes should be made on their system. II. Impact Depending on the specific configuration of the local site, the default permissions may allow local users to gain "root" access. III. Solution 1) Sun has provided a script to reset file and directory permissions to their correct values. The script is available in Sun's Patch #100103 version 11. This patch can be obtained via local Sun Answer Centers worldwid,e as well as through anonymous FTP from the ftp.uu.net (137.39.1.9) system in the /systems/sun/sun-dist directory. Patch ID Filename Checksum 100103-11 100103-11.tar.Z 19847 6 Please note that Sun Microsystems sometimes updates patch files. If you find that the checksum is different, please contact Sun Microsystems or CERT for verification. 2) Uncompress the file, extract the contents of the tar archive, and review the README file. % uncompress 100103-11.tar.Z % tar xfv 100103-11.tar % cat README 3) This patch will reset the group ownership of certain files to either "staff" or "bin". Make sure you have entries in the "/etc/group" file for these accounts. % grep '^staff:' /etc/group % grep '^bin:' /etc/group If you do not have both of these, you will need either to add the missing account(s) or to modify the patch script (4.1secure.sh) to reflect group ownerships appropriate for your site. (Note that the security problems are fixed by the ownerships and mode bits specified in the patch -- not by the group ownerships. Therefore, changing the group ownerships does not invalidate the patch.) 4) As "root", run the patch script. # sh 4.1secure.sh This patch fixes Sun BugId's 1046817, 1047044, 1048142, 1054480, 1037153, 1039292, and 1042662. 5) The patch script will set "/usr/kvm/crash" to mode 02700 owned by "root". While this is not insecure, since only "root" can run the program, CERT recommends that the setgid bit be removed to prevent abuse if world execute permission were to be added some time later. As "root", make "/usr/kvm/crash" not a set-group-id program. # chmod 755 /usr/kvm/crash --------------------------------------------------------------------------- If you believe that your system has been compromised, contact the CERT Coordination Center or your representative in FIRST (Forum of Incident Response and Security Teams). Internet E-mail: cert@cert.org Telephone: 412-268-7090 (24-hour hotline) CERT personnel answer 7:30 a.m.-6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for emergencies during other hours. CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 Past advisories, information about FIRST representatives, and other information related to computer security are available for anonymous FTP from cert.org (192.88.209.5). **************************************************************************** * * * The point of contact for MILNET security-related incidents is the * * Security Coordination Center (SCC). * * * * E-mail address: SCC@NIC.DDN.MIL * * * * Telephone: 1-(800)-365-3642 * * * * NIC Help Desk personnel are available from 7:00 a.m.-7:00 p.m. EST, * * Monday through Friday except on federal holidays. * * * ****************************************************************************