About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

CERT Security Advisory (NCSA.telnet.vulnerability)


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
===========================================================================
CA-91:15 CERT Advisory
September 10, 1991
Mac/PC NCSA Telnet Vulnerability

---------------------------------------------------------------------------

The Computer Emergency Response Team/Coordination Center (CERT/CC) has
received information concerning a vulnerability in the default
configurations of National Center for Supercomputing Applications
(NCSA) Telnet for both the Macintosh and the PC. The vulnerability
also affects the version of NCSA Telnet with IBM 3270 terminal
emulation distributed by Clarkson University. Two workarounds are
available that correct this problem.

NCSA has committed to changing the default configurations in future
releases. Maintenance updates for both the Macintosh and the PC are
planned to be released in about 2 months.

NCSA provides two e-mail addresses for Telnet questions, comments,
and bug reports:

PC Telnet [email protected]
Mac Telnet [email protected]

---------------------------------------------------------------------------

I. Description

The default configuration of NCSA Telnet for both the Macintosh
and the PC has a serious vulnerability in its implementation of
an ftp server.

The default configuration file enables ftp via the "ftp=yes"
line. However, sites should be aware that ftp is also enabled
in the absence of any ftp statement in the configuration file.

II. Impact

Any Internet user can connect via ftp to a PC or Macintosh
running the default configuration of NCSA Telnet and gain
unauthorized read and write access to any of its files, including
system files.

III. Solution

Either disable ftp server functionality or provide password
protection as described below.

To disable the ftp server, add an "ftp=no" line in the
configuration file.

If the ftp server option is enabled (via either an "ftp=yes" line
in the configuration file or the absence of an ftp statement in the
configuration file), then the Telpass program (included with both
Mac and PC versions) can be used to provide password protection.
Telpass is used to enter usernames and encrypted passwords into a
password file. The configuration file specifies the name and
location of the password file in the "passfile=" statement. The
usage of Telpass is documented in Chapter 5 of version 2.4 of the
Macintosh version documentation and Chapter 7 of version 2.3 of the
PC version. Note that the documentation (as well as the package
itself) is available by anonymous ftp from ftp.ncsa.uiuc.edu
(141.142.20.50).

The instructions for enabling password protection differ between
the Macintosh and PC versions, but in both cases they involve
enabling the "passfile" option in the configuration file, and
creating usernames and encrypted passwords with the Telpass
program.

CERT/CC strongly urges all sites running NCSA Telnet to implement
one of these two workarounds.

---------------------------------------------------------------------------
The CERT/CC would like to thank NCSA and Clarkson University for their
assistance.
---------------------------------------------------------------------------

If you believe that your system has been compromised, contact CERT/CC via
telephone or e-mail.

Computer Emergency Response Team/Coordination Center (CERT/CC)
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890

Internet E-mail: [email protected]
Telephone: 412-268-7090 24-hour hotline:
CERT/CC personnel answer 7:30a.m.-6:00p.m. EDT,
on call for emergencies during other hours.

Past advisories and other computer security related information are available
for anonymous ftp from the cert.org (192.88.209.5) system.
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS