***********************************************************************
DDN Security Bulletin 9103       DCA DDN Defense Communications System
27 Mar 91               Published by: DDN Security Coordination Center
                                    ([email protected])  (800) 235-3155

                       DEFENSE  DATA  NETWORK
                         SECURITY  BULLETIN

The DDN  SECURITY BULLETIN  is distributed  by the  DDN SCC  (Security
Coordination Center) under  DCA contract as  a means of  communicating
information on network and host security exposures, fixes, &  concerns
to security & management personnel at DDN facilities.  Back issues may
be  obtained  via  FTP  (or  Kermit)  from  NIC.DDN.MIL  [192.67.67.20]
using login="anonymous" and password="guest".  The bulletin pathname is
SCC:DDN-SECURITY-yynn (where "yy" is the year the bulletin is issued
and "nn" is a bulletin number, e.g. SCC:DDN-SECURITY-9001).
**********************************************************************

                   Patch Available for SunOS in.telnetd


+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
!                                                                       !
!     The following important  advisory was  issued by the Computer     !
!     Incident Advisory Capability (CIAC) and is being relayed unedited !
!     via the Defense Communications Agency's Security Coordination     !
!     Center  distribution  system  as a  means  of  providing  DDN     !
!     subscribers with useful security information.                     !
!                                                                       !
+ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - +



                          NO RESTRICTIONS
       _____________________________________________________
            The Computer Incident Advisory Capability
                        ___  __ __    _     ___
                       /       |     / \   /
                       \___  __|__  /___\  \___
       _____________________________________________________
                        Information Bulletin

March 26, 1991, 1330 PST                                     Number B-20

                   Patch Available for SunOS in.telnetd
________________________________________________________________________
PROBLEM:  SunOS versions 4.0.3 through 4.1.1 in.telnetd exhibits may
         send output to an authorized user.
PLATFORM: All Sun3 and Sun4 computers running SunOS 4.0.3, 4.1 or
         4.1.1.
DAMAGE:   May allow unauthorized access to the system.
SOLUTIONS:  Patch/update available from Sun.
IMPACT OF PATCH:  Vulnerability eliminated.  No other side-effects
         reported.
_______________________________________________________________________
                Critical Information about in.telnetd Patch

Sun Microsystems has recently announced the availability of a new patch
for the utility in.telnetd (the daemon that controls the remote login
program, telnet).  If not patched this utility may allow unauthorized
access to systems.  The patch is available from Sun Microsystems as
Patch ID# 100125-02 (this number is required to order this patch from
the Sun Answer Center).  This patch is also available via anonymous ftp
at uunet.uu.net (IP# 192.48.96.2) in the file
sun-dist/100125-02.tar.Z.  If you obtain the patch using anonymous ftp,
no additional installation instructions are necessary.  If you obtain
the patch in some other manner (e.g., from CIAC), we suggest that you
use the following installation procedure:

1.      Log in as root on the system to be repaired.

2.      Disable the flawed version of in.telnetd with the following
commands:

       # mv /usr/etc/in.telnetd /usr/etc/in.telnetd.FCS
       # chmod 600 /usr/etc/in.telnetd.FCS

3.      Obtain the patch file 100125-02.tar.Z (either from Sun or a trusted
anonymous FTP site such as uunet.uu.net).

4.      Uncompress the patch file:

       # uncompress 100125-02.tar.Z

5.      Extract the patch file appropriate to your architecture (either
3, 3x, 4, or 4c -- contact your Sun representative if you do not know
which architecture you have)

       # tar xf 100125-02.tar {architecture}/in.telnetd
       where {architecture} is one of 3, 3x, 4, or 4c.

6.      Copy the patch file to the appropriate directory, and set the
ownership and permissions of the utility:

       # cp {architecture}/in.telnetd /usr/etc/in.telnetd
       # chown root.staff /usr/etc/in.telnetd
       # chmod 755 /usr/etc/in.telnetd

7.      Kill any existing telnet processes that may be running.

       # ps ugax | grep in.telnetd
       # kill -9 ####
       where #### is the number of each in.telnetd process found in
       the previous command.  Please note that this command may
       disrupt ongoing sessions of users attempting to use the
       system.  As an alternative to this step, you may consider
       rebooting the computer, allowing time for all current users to
       log out.

Once you have verified that the new version of telnet is operational,
it is advisable to delete the unpatched version of the utility
(/usr/etc/in.telnetd.FCS) to prevent its unauthorized use.

For additional information or assistance, please contact CIAC:

       Tom Longstaff
       (415) 423-4416 or (FTS) 543-4416

       Call CIAC at (415) 422-8193 or (FTS) 532-8193 or
       send e-mail to [email protected].

       Send FAX messages to:  (415) 423-0913 or (FTS) 543-0913

Sun Microsystems provided information contained in this bulletin.  This
document was prepared as an account of work sponsored by an agency of
the United States Government. Neither the United States Government nor
the University of California nor any of their employees, makes any
warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process disclosed, or represents
that its use would not infringe privately owned rights. Reference
herein to any specific commercial products, process, or service by
trade name, trademark, manufacturer, or otherwise, does not necessarily
constitute or imply its endorsement, recommendation or favoring by the
United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or
reflect those of the United States Government or the University of
California, and shall not be used for advertising or product
endorsement purposes.
Organization:  National Institute of Standards and Technology (NIST)
Sub-Organization:  National Computer Systems Laboratory




Downloaded From P-80 International Information Systems 304-744-2253