[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Multiple SunOS Vulnerabilities Patched

Title: Multiple SunOS Vulnerabilities Patched
Released by: CERT
Date: 21st July 1992
Printable version: Click here
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



===========================================================================

CA-92:15  

Last Revised: September 19,1997

                Attached copyright statement

                              CERT Advisory

                                July 21, 1992

                    Multiple SunOS Vulnerabilities Patched



- ---------------------------------------------------------------------------

            *** This advisory supersedes CA-91:16. ***



The CERT/CC (Computer Emergency Response Team/Coordination Center) has

received information concerning several vulnerabilities in the Sun

Microsystems, Inc. (Sun) operating system (SunOS).  These vulnerabilities

affect all architectures and supported versions of SunOS including 4.1,

4.1.1, and 4.1.2 on sun3, sun3x, sun4, sun4c, and sun4m.  The patches have

been released as upgrades to three existing patch files.



Since application of these patches involves rebuilding your system kernel

file (/vmunix), it is recommended that you apply all patches simultaneously.

Use the procedure described below to apply the patches and rebuild the kernel.



Sun has provided patches for these vulnerabilities as updates to

Patch IDs 100173, 100376, and 100567. They are available through your local

Sun Answer Centers worldwide as well as through anonymous ftp from the

ftp.uu.net (137.39.1.9) system (in the /systems/sun/sun-dist directory).



Fix                     Patch ID       Filename            Checksum

NFS Jumbo               100173-08    100173-08.tar.Z      32716   562

Integer mul/div         100376-04    100376-04.tar.Z      12884   100

ICMP redirects          100567-02    100567-02.tar.Z      23118    13



Please note that Sun Microsystems sometimes updates patch files.  If you

find that the checksum is different please contact Sun Microsystems or CERT

for verification.



- ---------------------------------------------------------------------------



NFS jumbo patch upgrade, SunOS 4.1, 4.1.1, 4.1.2, all architectures



I.   Description



     The upgrade to the NFS Jumbo patch addresses a vulnerability that

     allows an intruder to become root using NFS.  This vulnerability

     affects all architectures and supported versions of SunOS.



II.  Impact



     A remote user may exploit this vulnerability to gain root access.



III. Solution



     Extract the new files to be installed in the kernel.



     Install the patch files in /sys/`arch -k`/OBJ as described in the

     README file included in the patch file.  Be sure to make a backup

     of each of the files you are replacing before moving the patched

     file to the /sys/`arch -k`/OBJ directory.



     Config, make, and install the new kernel to include all patches

     described in this advisory appropriate to your system.  Reboot

     each host using the appropriate kernel.  Refer to the Systems and

     Network Administration manual for instructions on building and

     configuring a new custom kernel.





Integer mul/div patch upgrade, SunOS 4.1, 4.1.1, 4.1.2, SPARC architectures



I.   Description



     The integer mul/div patch upgrade addresses an additional problem with

     the integer multiplication emulation code on SPARC architectures that

     allows an intruder to become root.  This vulnerability affects SPARC

     architectures (sun4, sun4c, and sun4m) for all supported versions of

     SunOS (4.1, 4.1.1, and 4.1.2).



II.  Impact



     A local user may exploit a bug in the emulation routines to gain

     root access or crash the system.



III. Solution



     Extract the new files to be installed in the kernel.  Note that

     this patch applies only to SPARC architectures.



     Install the patch files in /sys/`arch -k`/OBJ as described in the

     README file included in the patch file.  Be sure to make a backup

     of each of the files you are replacing before moving the patched

     file to the /sys/`arch -k`/OBJ directory.



     Config, make, and install the new kernel to include all patches

     described in this advisory appropriate to your system.  Reboot

     each host using the appropriate kernel.  Refer to the Systems and

     Network Administration manual for instructions on building and

     configuring a new custom kernel.





ICMP redirects patch upgrade, SunOS 4.1, 4.1.1, 4.1.2, all architectures



I.   Description



     The ICMP redirects patch addresses a denial of service vulnerability

     with SunOS that allows an intruder to close existing network

     connections to and from a Sun system.  This vulnerability affects all

     Sun architectures and supported versions of SunOS.



II.  Impact



     A remote user may deny network services on a Sun system.



III. Solution



     Extract the new file to be installed in the kernel (the patch is

     the same for all supported versions of SunOS).



     Install the patch files in /sys/`arch -k`/OBJ as described in the

     README file included in the patch file.  Be sure to make a backup

     of each of the files you are replacing before moving the patched

     file to the /sys/`arch -k`/OBJ directory.



     Config, make, and install the new kernel to include all patches

     described in this advisory appropriate to your system.  Reboot

     each host using the appropriate kernel.  Refer to the Systems and

     Network Administration manual for instructions on building and

      configuring a new custom kernel.



- ---------------------------------------------------------------------------

The CERT/CC wishes to thank Helen Rose of the EFF, Gordon Irlam of the

University of Adelaide, Wietse Venema of Eindhoven University, and Ken

Pon at Sun Microsystems, Inc for their assistance.

- ---------------------------------------------------------------------------



If you believe that your system has been compromised, contact CERT/CC or

your representative in FIRST (Forum of Incident Response and Security Teams).



Internet E-mail: cert@cert.org

Telephone: 412-268-7090 (24-hour hotline)

           CERT/CC personnel answer 7:30 a.m.-6:00 p.m. EST(GMT-5)/EDT(GMT-4),

           on call for emergencies during other hours.



Computer Emergency Response Team/Coordination Center (CERT/CC)

Software Engineering Institute

Carnegie Mellon University

Pittsburgh, PA 15213-3890



Past advisories, information about FIRST representatives, and other

information related to computer security are available for anonymous ftp

from cert.org (192.88.209.5).



- ------------------------------------------------------------------------------



Copyright 1992 Carnegie Mellon University. Conditions for use, disclaimers,

and sponsorship information can be found in

http://www.cert.org/legal_stuff.html and http://ftp.cert.org/pub/legal_stuff .

If you do not have FTP or web access, send mail to cert@cert.org with

"copyright" in the subject line.



CERT is registered in the U.S. Patent and Trademark Office.





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



Revision History:



September 19,1997  Attached Copyright Statement



-----BEGIN PGP SIGNATURE-----

Version: PGP for Personal Privacy 5.0

Charset: noconv



iQA/AwUBOBS+olr9kb5qlZHQEQJfeACfXPb9gNcwxPCaVgF0PPztzYYlHYgAoLnj

zckhUZCR++mRH7++j88K8526

=7Ati

-----END PGP SIGNATURE-----








(C) 1999-2000 All rights reserved.