About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

NIA #45 - CERT Advisory : Sunview


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
???????????????????? ????????????????????????????????? ????????????????????
? Founded By: ? ? Network Information Access ? ? Mother Earth BBS ?
? Guardian Of Time ??? 15AUG90 ??? <DOWN> ?
? Judge Dredd ? ? Judge Dredd ? ? UNAVAILIBLE ?
???????????????????? ? File 45 ? ????????????????????
? ????????????????????????????????? ?
????????????????????????????????????????????????????????
?? CERT Advisory: SunView selection_svc Vulnerability ??
??????????????????????????????????????????????????????

CA-90:05 CERT Advisory
August 14, 1990
SunView selection_svc vulnerability
-----------------------------------------------------------------------------

Sun has recently released a patch for a security hole in SunView.
This problem affects SunView running on all versions of SunOS (3.5 and
before, 4.0, 4.0.1, 4.0.3, and 4.1) and all platforms (Sun3, Sun4,
386i). This vulnerability allows any remote system to read selected
files from the workstation running SunView. As noted below in the
IMPACT section, the files that can be read are limited.

This vulnerability is in the SunView (aka SunTools) selection_svc
facility and can be exploited while SunView is in use; however, as
noted below in the IMPACT section, this bug may be exploitable after
the user quits using Sunview. This problem cannot be exploited while
X11 is in use (unless the user runs X11 after running Sunview; see the
IMPACT section). This problem is specific to Sun's SunView software;
to our knowledge, this problem does NOT affect other vendor platforms
or software.

OBTAINING THE PATCH

To obtain the patch, please call your local Sun Answer Center
(in the USA, it's 1-800-USA-4SUN), and ask for patch number 100085-01.
You can also reference Sun Bug ID 1039576.

The patch is available for SunOS 4.0.1, 4.0.3 and SunOS 4.1, on Sun3,
Sun4, and 386i architectures. Contact Sun for further details.

IMPACT

On Sun3 and Sun4 systems, a remote system can read any file that is
readable to the user running SunView. On the 386i, a remote system
can read any file on the workstation running SunView regardless of
protections. Note that if root runs Sunview, all files are
potentially accessible by a remote system.

If the password file with the encrypted passwords is world readable,
an intruder can take the password file and attempt to guess passwords.
In the CERT/CC's experience, most systems have at least one password
that can be guessed.

Sunview does not kill the selection_svc process when the user quits
from Sunview. Thus, unless the process is killed, remote systems can
still read files that were readable to the last user that ran Sunview.
Under these circumstances, once a user has run Sunview, start using
another window system (such as X11), or even logoff, but still have
files accessible to remote systems. However, even though
selection_svc is not killed when Sunview exits, the patch still solves
the security problem and prevents remote access.

CONTACT INFORMATION

For further questions, please contact your Sun answer center or send
mail to [email protected].

Thanks to Peter Shipley for discovering, documenting, and helping
resolve this problem.

[OTHER WORLD BBS]
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS