[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : SunOS in.telnetd Vulnerability

Title: SunOS in.telnetd Vulnerability
Released by: CERT
Date: 21st March 1991
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



CA-91:02a 

Last revised: September 18,1997

                Attached copyright statement



                          REVISED CERT Advisory

                            March 27, 1991

                    SunOS in.telnetd Vulnerability 



- -------------------------------------------------------------------------



                 *** THIS IS A REVISED CERT ADVISORY ***

            *** CONTAINS NEW INFORMATION AND A CORRECTION ***





DESCRIPTION:



The Computer Emergency Response Team/Coordination Center (CERT/CC) has

obtained information from Sun Microsystems, Inc. regarding a vulnerability

affecting SunOS 4.1 and 4.1.1 versions of in.telnetd on all Sun 3 and

Sun 4 architectures.  This vulnerability also affects SunOS 4.0.3 versions

of both in.telnetd and in.rlogind on all Sun3 and Sun 4 architectures.

To our knowledge, a vulnerability does not exist in the SunOS 4.1 and 4.1.1

versions of in.rlogind.  The vulnerability has been fixed by Sun Microsystems,

Inc.



This advisory has been revised to include information on the new patches

available for SunOS 4.0.3.  The CERT would also like to mention that the

name of the compressed tarfile included in the previous CERT Advisory,

CA-91:02, was incorrect. It was listed as 1001125-02.tar.Z and it should

have been 100125-02.tar.Z.  We regret any inconvenience this may have caused.



Please be aware that the new compressed tarfile provided by Sun Microsystems,

Inc. includes all of the patched files for SunOS 4.0.3, SunOS 4.1, and

SunOS 4.1.1.  That is, the tarfile contains the new patches for SunOS

4.0.3 as well as those files previously distributed in the 100125-02.tar.Z

tarfile.  The installation of the patch differs between SunOS 4.0.3

and SunOS 4.1.x.





IMPACT:



The vulnerability allows a user on the system to gain unauthorized

access to other accounts, including root.





SOLUTION for SunOS 4.0.3 and 4.0.3c:



Sun Microsystems, Inc. has patched versions of in.telnetd and in.rlogind

available for SunOS 4.0.3 on all Sun 3 and Sun 4 architectures.  The Sun 

Patch ID is 100125-03 which is needed when ordering the patch from a Sun

Answer Center. In the US, telephone (800) USA-4SUN.  The checksum of the

compressed tarfile (filename 100125-03.tar.Z) is 17128 102.  The compressed

tarfile is available by anonymous FTP on uunet.uu.net (192.48.96.2) in

sun-dist/100125-03.tar.Z.  Please note: This compressed tarfile

also includes patched versions of in.telnetd for SunOS 4.1 and 4.1.1. 

Please disregard these files.





SunOS 4.0.3 patch installation instructions are as follows:



  # mv /usr/etc/in.telnetd /usr/etc/in.telnetd.FCS

  # mv /usr/etc/in.rlogind /usr/etc/in.rlogind.FCS

  # chmod 600 /usr/etc/in.telnetd.FCS 

  # chmod 600 /usr/etc/in.rlogind.FCS 



(These four steps store the old versions as a precaution and change the

file modes so that the old versions cannot be executed. After verifying

the new versions, the old versions should be removed.)





  # cp sun{3,3x,4,4c}/{4.0.3,4.0.3c}/in.telnetd /usr/etc/in.telnetd

  # cp sun{3,3x,4,4c}/{4.0.3,4.0.3c}/in.rlogind /usr/etc/in.rlogind



(Be sure to copy the appropriate versions for your architecture.)





  # chmod 711 /usr/etc/in.telnetd 

  # chmod 711 /usr/etc/in.rlogind

  # chown root /usr/etc/in.telnetd 

  # chown root /usr/etc/in.rlogind

  # chgrp staff /usr/etc/in.telnetd 

  # chgrp staff /usr/etc/in.rlogind

  # kill {any executing in.telnetd and in.rlogind process(es) (SEE NOTE)}



NOTE: Be careful in killing existing in.telnetd and in.rlogind processes, 

      as they may be legitimate users attempting to login to the system.



- -------------------------------------------------------------------------





SOLUTION for SunOS 4.1 and 4.1.1:



Sun Microsystems, Inc. has patched versions of in.telnetd available for

SunOS 4.1 and 4.1.1 on all Sun 3 and Sun 4 architectures.  The Sun

Patch ID is 100125-03 which is needed when ordering the patch from a Sun

Answer Center. In the US, telephone (800) USA-4SUN.  The checksum of the

compressed tarfile (filename 100125-03.tar.Z) is 17128 102.  The compressed

tarfile is available by anonymous FTP on uunet.uu.net (192.48.96.2) in

sun-dist/100125-03.tar.Z.  Please note:  This tarfile includes patched

versions of in.telnetd and in.rlogind for SunOS 4.0.3.  Please disregard

these files.



Patch installation instructions are as follows:



  # mv /usr/etc/in.telnetd /usr/etc/in.telnetd.FCS

  # chmod 600 /usr/etc/in.telnetd.FCS



(These two steps store the old version as a precaution and change the

file mode to that the old version cannot be executed; after verifying

the new version, the old version should be removed.)



  # cp sun{3,3x,4,4c}/4.1/in.telnetd /usr/etc/in.telnetd



(Be sure to copy the appropriate version for your architecture.)



  # chmod 711 /usr/etc/in.telnetd

  # chown root /usr/etc/in.telnetd

  # chgrp staff /usr/etc/in.telnetd

  # kill {any executing in.telnetd process(es) (SEE NOTE)}



NOTE: Be careful in killing existing in.telnetd processes, as they may

      be legitimate users attempting to login to the system.



- -------------------------------------------------------------------------

Computer Emergency Response Team/Coordination Center (CERT/CC)

Software Engineering Institute

Carnegie Mellon University

Pittsburgh, PA 15213-3890



Internet E-mail: cert@cert.org

Telephone: 412-268-7090 24-hour hotline:

           CERT personnel answer 7:30a.m.-6:00p.m. EST.

           On call for emergencies during other hours.



Past advisories and other computer security related information are available

for anonymous ftp from the cert.org (192.88.209.5) system.



- --------------------------------------------------------------------------





Copyright 1991 Carnegie Mellon University. Conditions for use, disclaimers,

and sponsorship information can be found in

http://www.cert.org/legal_stuff.html and http://ftp.cert.org/pub/legal_stuff .

If you do not have FTP or web access, send mail to cert@cert.org with

"copyright" in the subject line.



CERT is registered in the U.S. Patent and Trademark Office.



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Revision History



September 18,1997  Attached Copyright Statement







-----BEGIN PGP SIGNATURE-----

Version: PGP for Personal Privacy 5.0

Charset: noconv



iQA/AwUBOBS8zFr9kb5qlZHQEQKuMACgwS+4vbEUwWYHMmOhrqLHr9mvPL0AoPO3

REDb3752o6pVLr4L1PHitDDI

=9Co2

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.