************************************************************************** Security Bulletin 9433 DISA Defense Communications System December 7, 1994 Published by: DDN Security Coordination Center (SCC@NIC.DDN.MIL) 1-(800) 365-3642 DEFENSE DATA NETWORK SECURITY BULLETIN The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security Coordination Center) under DISA contract as a means of communicating information on network and host security exposures, fixes, and concerns to security and management personnel at DDN facilities. Back issues may be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.112.36.5] using login="anonymous" and password="guest". The bulletin pathname is scc/ddn-security-yynn (where "yy" is the year the bulletin is issued and "nn" is a bulletin number, e.g. scc/ddn-security-9428). ************************************************************************** + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + ! ! ! The following important advisory was issued by the Automated ! ! Systems Security Incident Support Team (ASSIST) and is being ! ! relayed unedited via the Defense Information Systems Agency's ! ! Security Coordination Center distribution system as a means ! ! of providing DDN subscribers with useful security information. ! ! ! + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Automated Systems Security Incident Support Team _____ ___ ___ _____ ___ _____ | / /\ / \ / \ | / \ | | / Integritas / \ \___ \___ | \___ | | < et /____\ \ \ | \ | | \ Celeritas / \ \___/ \___/ __|__ \___/ | |_____\ <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> Bulletin 94-39 Release date: 7 December 94 1994, 11:15 AM EST (GMT -4) SUBJECT: SCO UNIX at, login, prwarn, sadc, and pt_chmod Patches Available. SUMMARY: This bulletin contains information about vulnerabilities in the SCO Unix operating system and a security advisory released by SCO. SCO C2 systems may also be affected by these vulnerabilities. BACKGROUND: The at(C), login(M), prwarn(C) sadc(ADM), and pt_chmod programs included in the SCO Unix software contain security vulnerablities. Detailed information about how to exploit these problems is known to have been released in various Internet discussion forums. IMPACT: Any user with an account on a SCO UNIX system can obtain root privileges using any one of the programs listed. RECOMMENDED SOLUTION: A SCO advisory that addresses these problems and provides solutions follows. ASSIST recommends all DoD elements with SCO systems affected by these vulnerabilities install the appropriate patches as soon as possible. ======================================================================== SCO Advisory 94:001 November 30th, 1994 Patches for at(C), login(M), prwarn(C), sadc(ADM), pt_chmod - ------------------------------------------------------------------------ The Santa Cruz Operation has been informed of the following problems present in our software. I. Description The programs at(C), login(M), prwarn(C) sadc(ADM), and pt_chmod may each allow unauthorized root access to the system. There are four unrelated issues present, one for each program listed above. II. Impact Any user with an account on the system may obtain root access using any one of the programs listed. III. Releases These problems exist on the following releases of SCO Products: SCO Unix System V/386 Release 3.2 Versions 4.2, 4.1, and 4.0 SCO Open Desktop Lite Release 3.0 SCO Open Desktop Release 3.0 and 2.0 SCO Open Server Network System Release 3.0 SCO Open Server Enterprise System Release 3.0 IV. Solution SCO is providing the following (S)ystem (S)ecurity (E)nhancements, SSEs, to address these problems. These are preliminary patches which SCO feels addresses the issues at hand, but these patches have not been fully tested and integrated and hence cannot officially be supported. Official patches should be available in the near future via a (S)upport (L)evel (S)upplement. (SLS). The README file mentioned below will be updated when an official Supplement is available. Binary Patch ------ ------ at(C) sse001 login(M) sse002 prwarn(C) sse003 sadc(ADM) sse004 pt_chmod sse005 These are available at the following sites: Anonymous ftp: ftp.sco.COM:/SSE UUCP downloading, and SOS access: sosco (USA), scolon (Europe), in the directory /usr/spool/uucppublic/SSE. Note that access to these Supplements at scolon may not be available until December 2nd, 1994. The filename conventions are as follows: ssexxx.tar.Z - compressed tar file of supplement ssexxx.ltr.Z - compressed cover letter for supplement xxx indicates the number of the supplement, i.e. sse001.tar.Z. See the README file in the directories listed above for checksum information. Connection information is available at the end of this document. Please note that these Supplements are not generally available from SCO on diskette media. If you have further questions, contact your support provider. If you need to contact SCO, please send electronic mail to support@sco.COM, or contact SCO as follows. USA/Canada: 6am-5pm Pacific Standard Time (PST) ----------- 1-800-347-4381 (voice) 1-408-427-5443 (fax) Pacific Rim, Asia, and Latin American customers: 6am-5pm Pacific ------------------------------------------------ Standard Time (PST) 1-408-425-4726 (voice) 1-408-427-5443 (fax) Europe, Middle East, Africa: 9am-5:30pm British Standard Time (BST) ---------------------------- +44 (0)923 816344 (voice) +44 (0)923 817781 (fax) Downloading Information - ----------------------- ftp to ftp.sco.com Login name: ftp Password: your email address For anonymous UUCP connection: - ------------------------------ For USA, Canada, Pacific Rim, Asia and Latin America customers: Machine name: sosco Login name: uusls (fourth character is the letter "l") No password List of modems available for UUCP transfer from sosco.sco.com: Standard V.32, (300-9600bps) 4@ 408-425-3502 Hayes V Series 9600 2@ 408-427-4470 Telebit Trailblazer 408-429-1786 For Europe/Middle East/Africa customers there is a system located at SCO EMEA (London): Machine name: scolon Login name: uusls Password: bbsuucp List of modems available for UUCP transfer from scolon.sco.com: Dowty Trailblazer +44 (0)923 210911 For SCO Online Support (SOS) BBS download: - ------------------------------------------ For those customers that have accounts on SOS these files can be downloaded interactively via X, Y, Z MODEM or Kermit. Follow the menus selections under "Toolchest" from the main SOS menu. List of modems available for interactive transfer from sosco.sco.com: First four are Standard V.32 (300-9600bps) 408-426-9495 Last three are Hayes 2400 compatible Telebit Trailblazer 408-426-9525 For ftp via World Wide Web: - --------------------------- URL to open: ftp://www.sco.com These problems, except for pt_chmod, were reported to the Santa Cruz Operation by the "[8LGM] Security Team", 8lgm@bagpuss.demon.co.uk. - -------------------------- Here is the ftp.sco.com:/SSE/README file ----- Welcome to the System Security Enhancement (SSE) Area - ---------------------------------------------------- The System Security Enhancement directory, (SSE), is here to provide timely fixes to problems with system security. Binaries acquired from this directory are to be considered preliminary fixes only, and have not been fully tested or integrated. As such, these patches are not officially supported. They are provided as a timely response to security concerns that have been brought to the attention of The Santa Cruz Operation. When final, approved patches are available, usually by a Support Level Supplement, the README files below will be modified to indicate the existence of the finalized version of the supplement. SCO reserves the right to change the contents of these supplements at any time. The format of the Supplements found here are as follows: ssexxx.tar.Z - a compressed tar file ssexxx.ltr.Z - cover letter, release information, and installation instructions where xxx indicates the number of the supplement. Please note that the ssexxx.tar.Z files are *not* diskette images. After downloading an SSE, uncompress both the tar file and the cover letter. For example, if you were trying to install SSE001, after downloading sse001.tar.Z and ssexxx.ltr.Z, you would uncompress both files: # uncompress ssexxx.tar.Z # uncompress ssexxx.ltr.Z After uncompressing both files, you should then follow the instructions provided in the sse001.ltr file for installation instructions. These Supplements should be available in the following locations: site directory method - ---- --------- ------ ftp.sco.COM: /SSE Internet anonymous ftp sosco: /usr/spool/uucppublic/SSE UUCP download, SOS scolon: /usr/spool/uucppublic/SSE UUCP download, SOS List of New System Security Enhancements (last updated 11/29/94) - ---------------------------------------------------------------- New on 11/29/94: sse001: at(C) Enhancement sse002: login(M) Enhancement sse003: prwarn(C) Enhancement see004: sadc(ADM) Enhancement sse005: pt_chmod Enhancement sse006: passwd(C) Enhancement CONNECTION INFORMATION - ---------------------- For anonymous ftp connection: - ----------------------------- ftp to sosco.sco.com Login name: ftp Password: your email address ftp to ftp.sco.com Login name: ftp Password: your email address (Please note that the ftp server that is running on these machines expects your Domain Name to be publically known to the net. Please contact your internet provider for more information on registering your Domain Name) ftp to ftp.uu.net (NOTE: areas are located in the ./sco-archive directory) Login name: ftp Password: your email address For anonymous UUCP connection: - ------------------------------ For USA, Canada, Pacific Rim, Asia and Latin America customers: Machine name: sosco Login name: uusls (fourth character is the letter "l") No password List of modems available for UUCP transfer from sosco.sco.com: Standard V.32, (300-9600bps) 4@ 408-425-3502 Hayes V Series 9600 2@ 408-427-4470 Telebit Trailblazer 408-429-1786 For Europe/Middle East/Africa customers there is a system located at SCO EMEA (London): Machine name: scolon Login name: uusls Password: bbsuucp List of modems available for UUCP transfer from scolon.sco.com: Dowty Trailblazer +44 (0)923 210911 For SCO Online Support (SOS) BBS download: - ------------------------------------------ For those customers that have accounts on SOS these files can be downloaded interactively via X, Y, Z MODEM or Kermit. Follow the menus selections under "Toolchest" from the main SOS menu. List of modems available for interactive transfer from sosco.sco.com: First four are Standard V.32 (300-9600bps) 408-426-9495 Last three are Hayes 2400 compatible Telebit Trailblazer 408-426-9525 For ftp via World Wide Web: - --------------------------- URL to open: ftp://www.sco.com - ------------------------------------------------------------------------ List of available Security Enhancement (SSE) files: Numbers in parentheses are checksums of the files, generated using the "sum" utility with the -r option. Example: sum -r sse001.tar.Z NOTE: These files are for downloading only. They CANNOT be obtained from SCO on diskette. NOTE: Please see the ".ltr" files for a list of SCO platforms that these Enhancements apply to. Size in bytes File name (checksum) Description sse001.ltr.Z 2254 (62340) at(C) Enhancement sse001.tar.Z 28177 (01162) sse002.ltr.Z 2122 (64430) login(M) Enhancement sse002.tar.Z 60535 (24459) sse003.ltr.Z 2190 (39557) prwarn(C) Enhancement sse003.tar.Z 20742 (53203) sse004.ltr.Z 2491 (13484) sadc(ADM) Enhancement sse004.tar.Z 11936 (27375) sse005.ltr.Z 1025 (25407) pt_chmod Enhancement sse005.tar.Z 2414 (06033) sse006.ltr.Z 985 (36851) passwd(C) Enhancement sse006.tar.Z 86185 (19264) <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ASSIST is an element of the Defense Information Systems Agency (DISA), Center for Information Systems Security (CISS), that provides service to the entire DoD community. Constituents of the DoD with questions about ASSIST or computer security security issues, can contact ASSIST using one of the methods listed below. Non-DoD organizations/institutions, should contact their Forum of Incident Response and Security Teams (FIRST) (FIRST) representative. To obtain a list of FIRST member organizations and their constituencies send an email to docserver@first.org with an empty "subject" line and a message body containing the line "send first-contacts". ASSIST Information Resources: To be included in the distribution list for the ASSIST bulletins, send your Milnet (Internet) e-mail address to assist-request@assist.mil. Back issues of ASSIST bulletins, and other security related information, are available from the ASSIST BBS at 703-756-7993/1154 DSN 289-7993/1154, and through anonymous FTP from assist.mil (IP address 199.211.123.11). Note: assist.mil will only accept anonymous FTP connections from Milnet addresses that are registered with the NIC or DNS. ASSIST Contact Information: PHONE: 800-357-4231 (or 703-756-7974 DSN 289), duty hours are 06:00 to 22:30 EDT (GMT -4) Monday through Friday. During off duty hours, weekends and holidays, ASSIST can be reached via pager at 800-791- 4857. The page will be answered within 30 minutes, however if a quicker response is required, prefix the phone number with "999". ELECTRONIC MAIL: Send to assist@assist.mil. ASSIST BBS: Leave a message for the "sysop". Reference herein to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by ASSIST. The views and opinions of authors expressed herein shall not be used for advertising or product endorsement purposes. **************************************************************************** * * * The point of contact for MILNET security-related incidents is the * * Security Coordination Center (SCC). * * * * E-mail address: SCC@NIC.DDN.MIL * * * * Telephone: 1-(800)-365-3642 * * * * NIC Help Desk personnel are available from 7:00 a.m.-7:00 p.m. EST, * * Monday through Friday except on federal holidays. * * * **************************************************************************** PLEASE NOTE: Some users outside of the DOD computing communities may receive DDN Security bulletins. If you are not part of the DOD community, please contact your agency's incident response team to report incidents. Your agency's team will coordinate with DOD. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained by sending email to docserver@first.org with an empty subject line and a message body containing the line: send first-contacts. This document was prepared as an service to the DOD community. Neither the United States Government nor any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government. The opinions of the authors expressed herein do not necessarily state or reflect those of the United States Government, and shall not be used for advertising or product endorsement purposes.