***********************************************************************
DDN Security Bulletin 9103 DCA DDN Defense Communications System
27 Mar 91 Published by: DDN Security Coordination Center
(
[email protected]) (800) 235-3155
DEFENSE DATA NETWORK
SECURITY BULLETIN
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
Coordination Center) under DCA contract as a means of communicating
information on network and host security exposures, fixes, & concerns
to security & management personnel at DDN facilities. Back issues may
be obtained via FTP (or Kermit) from NIC.DDN.MIL [192.67.67.20]
using login="anonymous" and password="guest". The bulletin pathname is
SCC:DDN-SECURITY-yynn (where "yy" is the year the bulletin is issued
and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-9001).
**********************************************************************
Patch Available for SunOS in.telnetd
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
! !
! The following important advisory was issued by the Computer !
! Incident Advisory Capability (CIAC) and is being relayed unedited !
! via the Defense Communications Agency's Security Coordination !
! Center distribution system as a means of providing DDN !
! subscribers with useful security information. !
! !
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
NO RESTRICTIONS
_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin
March 26, 1991, 1330 PST Number B-20
Patch Available for SunOS in.telnetd
________________________________________________________________________
PROBLEM: SunOS versions 4.0.3 through 4.1.1 in.telnetd exhibits may
send output to an authorized user.
PLATFORM: All Sun3 and Sun4 computers running SunOS 4.0.3, 4.1 or
4.1.1.
DAMAGE: May allow unauthorized access to the system.
SOLUTIONS: Patch/update available from Sun.
IMPACT OF PATCH: Vulnerability eliminated. No other side-effects
reported.
_______________________________________________________________________
Critical Information about in.telnetd Patch
Sun Microsystems has recently announced the availability of a new patch
for the utility in.telnetd (the daemon that controls the remote login
program, telnet). If not patched this utility may allow unauthorized
access to systems. The patch is available from Sun Microsystems as
Patch ID# 100125-02 (this number is required to order this patch from
the Sun Answer Center). This patch is also available via anonymous ftp
at uunet.uu.net (IP# 192.48.96.2) in the file
sun-dist/100125-02.tar.Z. If you obtain the patch using anonymous ftp,
no additional installation instructions are necessary. If you obtain
the patch in some other manner (e.g., from CIAC), we suggest that you
use the following installation procedure:
1. Log in as root on the system to be repaired.
2. Disable the flawed version of in.telnetd with the following
commands:
# mv /usr/etc/in.telnetd /usr/etc/in.telnetd.FCS
# chmod 600 /usr/etc/in.telnetd.FCS
3. Obtain the patch file 100125-02.tar.Z (either from Sun or a trusted
anonymous FTP site such as uunet.uu.net).
4. Uncompress the patch file:
# uncompress 100125-02.tar.Z
5. Extract the patch file appropriate to your architecture (either
3, 3x, 4, or 4c -- contact your Sun representative if you do not know
which architecture you have)
# tar xf 100125-02.tar {architecture}/in.telnetd
where {architecture} is one of 3, 3x, 4, or 4c.
6. Copy the patch file to the appropriate directory, and set the
ownership and permissions of the utility:
# cp {architecture}/in.telnetd /usr/etc/in.telnetd
# chown root.staff /usr/etc/in.telnetd
# chmod 755 /usr/etc/in.telnetd
7. Kill any existing telnet processes that may be running.
# ps ugax | grep in.telnetd
# kill -9 ####
where #### is the number of each in.telnetd process found in
the previous command. Please note that this command may
disrupt ongoing sessions of users attempting to use the
system. As an alternative to this step, you may consider
rebooting the computer, allowing time for all current users to
log out.
Once you have verified that the new version of telnet is operational,
it is advisable to delete the unpatched version of the utility
(/usr/etc/in.telnetd.FCS) to prevent its unauthorized use.
For additional information or assistance, please contact CIAC:
Tom Longstaff
(415) 423-4416 or (FTS) 543-4416
Call CIAC at (415) 422-8193 or (FTS) 532-8193 or
send e-mail to
[email protected].
Send FAX messages to: (415) 423-0913 or (FTS) 543-0913
Sun Microsystems provided information contained in this bulletin. This
document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor
the University of California nor any of their employees, makes any
warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights. Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation or favoring by the
United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government or the University of
California, and shall not be used for advertising or product
endorsement purposes.
Organization: National Institute of Standards and Technology (NIST)
Sub-Organization: National Computer Systems Laboratory
Downloaded From P-80 International Information Systems 304-744-2253