home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1994 March
/
Internet Info CD-ROM (Walnut Creek) (March 1994).iso
/
inet
/
ddn-news
/
ddn-mgt-bulletin-64.txt
< prev
next >
Wrap
Text File
|
1991-07-10
|
4KB
|
98 lines
**********************************************************************
DDN MGT Bulletin 64 DCA DDN Defense Communications System
08 Aug 89 Published by: DDN Network Info Center
(NIC@NIC.DDN.MIL) (800) 235-3155
DEFENSE DATA NETWORK
MANAGEMENT BULLETIN
The DDN MANAGEMENT BULLETIN is distributed online by the DDN Network
Information Center under DCA contract as a means of communicating
official policy, procedures and other information of concern to
management personnel at DDN facilities. Back issues may be read
through the TACNEWS server ("@n" command at the TAC) or may be
obtained by FTP (or Kermit) from the SRI-NIC host [26.0.0.73 or
10.0.0.51] using login="anonymous" and password="guest". The pathname
for bulletins is DDN-NEWS:DDN-MGT-BULLETIN-nn.TXT (where "nn" is the
bulletin number).
**********************************************************************
SECURITY PROBLEM IN SUN3 AND SUN4 UNIX - RESTORE
APPLICABLE OPERATING SYSTEM: UNIX 4.0, 4.01, 4.03 running on Sun3 and
Sun4 machines.
PROBLEM: A serious security problem has been discovered in SunOS
restore. The problem occurs because restore is setuid to
root. Without going into details, is sufficient to say
that this is a serious hole. All SunOS 4.0 installations
should install one of the two workarounds described below.
The first is preferred as it makes restore unexecutable by
ordinary users, but this workaround makes it impossible to
restore via a remote tape drive. If you need to restore in
this way, the second workaround will limit the use of restore
to a select group.
WORKAROUND(1): Make restore non-setuid by becoming root and doing a
chmod 750 /usr/etc/restore
This makes restore non-setuid and unreadable and
unexecutable by ordinary users.
Making restore non-setuid affects the restore command
using a remote tape drive. You will no longer be able to
run a restore from another machine as an ordinary user;
instead, you'll have be root to do so. (The reason for
this is that the remote tape drive daemon on the machine
with the tape drive expects a request on a TCP privileged
port. Under SunOS, you can't get a privileged port unless
you are root. By making restore non-setuid, when you run
restore and request a remote tape drive, restore won't be
able to get a privileged port, so the remote tape drive
daemon won't talk to it.)
WORKAROUND(2): If you do need to have some users run restore from
remote tape drives without being root, you can use the
following workaround.
cd /usr/etc
chgrp operator restore
chmod 4550 restore
This allows the use of restore by some trusted group.
In this case, we used the group 'operator', but you may
substitute any other group that you trust with access
to the tape drive. Thus, restore is still setuid and
vulnerable, but only to the people in the trusted group.
The 4550 makes restore readable and executable by the group
you specified, and unreadable by everyone else.
CONTACTS: Call your Sun customer support representative if you have
any questions. Refer to this problem by Sun's bug number
1019265. If you have difficulty reaching your
representative, call the Sun Hotline at
(800) USA-4SUN or (800) 872-4786
Call CERT at (412) 268-7090 for general problem information.
Call SRI/NIC at 1-800-235-3155 for general information.
NOTE(1): This bulletin represents the best information available
at this time on this problem. As with any system
modification, WORK WITH YOUR SUN REPRESENTATIVE.
NOTE(2): Only those sites that run SunOS 4.0, 4.0.1, and 4.0.3 are
affected. It does not appear in SunOS 3.5.
NOTE(3): A user does need to have an existing account to exploit
this hole; however, `GUEST' is sufficient.