As new systems become accessible by networks there is a need for security. Many systems are shipped insecure which puts the responsibility on the customers to find and apply patches. This FAQ will be a guide for the many administrators who want to secure their systems.
This FAQ is broken down into the different sections:
Fixdist requirements:
Software:
Connection Requirements
Fixdist does not "install" any PTFs onto your system. It just transfers the fixes to a target directory on your RISC System/6000.
The AIX support line is at
http://aix.boulder.ibm.com/pbin-usa/getobj.pl?/pdocs-usa/public.html/>From that page, you can link to a forms-based keyword search, which you can use to query with the terms "aix" and "security". The direct link for the keyword search is:
http://aix.boulder.ibm.com/pbin-usa/pub_search.pl
/usr/sbin/no -o ipforwarding=0
/usr/sbin/no -o ipsendredirects=0
/usr/sbin/no -o nonlocsrcroute=0
Digital Equipment Corporation strongly urges Customers to upgrade to a minimum of ULTRIX V4.4 and DEC OSF/1 V2.0 then apply the Security Enhanced Kit.
- Please refer to the applicable Release Note information prior to upgrading your installation.
KIT PART NUMBERS and DESCRIPTIONS CSC PATCH # CSCPAT_4060 V1.0 ULTRIX V4.3 thru V4.4 (Includes DECnet-ULTRIX V4.2) CSCPAT_4061 V1.0 DEC OSF/1 V1.2 thru V2.0 These kits will not install on versions previous to ULTRIX V4.3 or DEC OSF/1 V1.2. The ULTRIX Security Enhanced kit replaces the following images: /usr/etc/comsat ULTRIX V4.3, V4.3a, V4.4 /usr/ucb/lpr " " /usr/bin/mail " " /usr/lib/sendmail " " *sendmail - is a previously distributed solution. /usr/etc/telnetd ULTRIX V4.3, V4.3a only For DECnet-ULTRIX V4.2 installations: /usr/etc/dlogind /usr/etc/telnetd.gw The DEC OSF/1 Security Enhanced kit replaces the following images: /usr/sbin/comsat DEC OSF/1 V1.2, V1.3 V2.0 /usr/bin/binmail /usr/bin/lpr " " /usr/sbin/sendmail DEC OSF/1 V1.2, V1.3 only *sendmail - is a previously distributed solution. /usr/bin/rdist " " /usr/shlib/libsecurity.so DEC OSF/1 V2.0 only
send doc xxxxxxxxxxxx
Summary of 'Security Bulletins Index' documents
Document Id Description HPSBMP9503-003 Security Vulnerability (HPSBMP9503-003) in MPE/iX releases HPSBMP9503-002 Security Vulnerability (HPSBMP9503-002) in MPE/iX releases HPSBMP9503-001 Security Vulnerability (HPSBMP9503-001) in MPE/iX releases HPSBUX9502-024 /usr/lib/sendmail has two security vulnerabilities HPSBUX9502-023 Security vulnerability in `at' & `cron' HPSBUX9502-022 Security Vulnerability involving malicious users HPSBUX9502-021 No current vulnerability in /bin/mail (or /bin/rmail) HPSBUX9501-020 Security Vulnerability in HP Remote Watch HPSBUX9411-019 Security Vulnerability in HP SupportWatch HPSBUX9410-018 Security Vulnerability in xwcreate/gwind HPSBUX9409-017 Security Vulnerability in CORE-DIAG fileset HPSBUX9408-000 Sum and MD5 sums of HP-UX Security Bulletins HPSBUX9408-016 Patch sums and the MD5 program HPSBUX9407-015 Xauthority problem HPSBUX9406-014 Patch file permissions vulnerability HPSBUX9406-013 vhe_u_mnt allows unauthorized root access HPSBUX9405-011 Security Vulnerability in HP GlancePlus HPSBUX9405-009 PROBLEM: Incomplete implementation of OSF/AES standard HPSBUX9405-010 ftpd: SITE CHMOD / race condition vulnerability HPSBUX9405-012 Security vulnerability in Multimedia Sharedprint HPSBUX9404-007 HP-UX does not have ftpd SITE EXEC vulnerability HPSBUX9404-008 Security Vulnerability in Vue 3.0 HPSBUX9402-006 Security Vulnerability in DCE/9000 HPSBUX9402-005 Security Vulnerability in Hpterm HPSBUX9402-004 Promiscuous mode network interfaces HPSBUX9402-003 Security Vulnerability in Subnetconfig HPSBUX9312-002 Security Vulnerability in Xterm HPSBUX9311-001 Security Vulnerability in SendmailIf you would like to obtain a list of additional files available via the HP SupportLine mail service, send the following in the TEXT PORTION OF THE MESSAGE to support@support.mayfield.hp.com:
send file_listTo get the newest security patch list:
send security_info_listTo get the most current security patches for each version of OS:
send hp-ux_patch_matrixHP-patches and patch-information are available by WWW:
SendmailPatch.23950.1ftp.next.com:/pub/NeXTanswers/Files/Security contains some security advisories.
RestorePatch.29807.16
Be sure to check for Rexd and uuencode alias.
uod368b -- passwdThese can be downloaded from ftp.sco.com:/SLS. First get the file "info" which lists the actual filenames and descriptions of the supplements.
oda377a -- xterm, scoterm, scosession, clean_screen
Security problems were made aware by 8LGM in the following programs for SCO:
Binary Patch ------ ------ at(C) sse001 login(M) sse002 prwarn(C) sse003 sadc(ADM) sse004 pt_chmod sse005
To contact SCO, send electronic mail to support@sco.com.
Patches are also available via anonymous ftp from sunsolve1.sun.com:/pub/patches online.sunsolve.sun.co.uk:/pub/patches/
Check out the the sunsolve www-page at http://online.sunsolve.sun.co.uk/
Here's a Sun site that has many security FAQes and Patches:
http://access1.sun.com
Sendmail patches are important. Check out Sendmail section.
Turn off IP-Forward on SunOs Kernel and kmem via:
"echo ip_forwarding/W 0" | adb -w /vmunix /dev/kmemTo turn off source routed packets on Solaris 2.X. Edit /etc/rc.2.d/S69.inet and change
ndd -set /dev/ip ip_forwarding 0reboot.
ndd -set /dev/ip ip_ip_forward_src_routed 0
Source routing patch for SunOs 4.1.x ftp.greatcircle.com:/pub/firewalls/digest/v03.n153.Z
To Secure a Sun console physically:
(for desktop sparc models)
$su(for other models)
#eeprom security-mode=command
Password:
Retype password:
#
$suThis restricts access to the new command mode.
#eeprom secure=command
Password:
Retype password:
#
Remove suid from crash, devinfo. These both are known to be exploitable
on some Sun and are rarely used.
The following is a package of patches for SunOs from Australian group SERT:
ftp.sert.edu.au:/security/sert/tools/MegaPatch.1.7.tar.Z
ftp.fwi.uva.nl:/pub/solaris/auto-install/* .
After each patch installation, you will need to re-run the fix-mode.
Solution:
"find /opt/SUNWdxlib -exec chmod go-w {} \;"Fix-modes will do a better job correcting permissions. You can do a simple check for trojans with:
"pkgchk SUNWdxlib".
Solution: By putting a "S00umask.sh" with contents "umask 022" in each /etc/rc?.d it will make sure that all daemons will start with an umask of 022.
The default umask really should be 022, not 0.
"strings /var/nis/{hostname}.dict" to make sure all the paths are sane, then to correct permissions:
"chmod 644 /var/nis/{hostname}.dict"
"chmod 700 /var/nis/{hostname}"
"chmod 600 /var/nis/{hostname}/*"
Solution:
"chmod 644 /etc/hostname.le0"
Solution:
"find /var/statmon -exec chmod o-w {} \;"
/var/adm/vold.logSolution: It may not be possible to tighten up permissions on all the world writeable files out there without breaking something. However, it'd be a good idea to at least know what they are. Something like:
/var/log/syslog*
/var/lp/logs/lpsched
/var/lp/logs/lpNet
/etc/mnttab
/etc/path_to_inst.old
/var/saf/_log
/etc/rmtab
"find / -user root \( -type d -o -type f \) -perm -2 -ls"will at least let you know which files may contain bogus information. Checking for other than root, bin, sys, lp, etc. group writeable files would be a good idea as well.
Solution: Change permission to 0755.
Solution: Change permissions to 755.
{3.3,4.0,5.0} including sendmail and lpr. lpr allowed anyone to get root access.
Patch65 and patch34 correct vulnerability in SGI help system which enabled users to gain root priviledges.
Standard System V MD5 Unix Unix Digital Signature patch34.tar.Z: 11066 15627 1674 31253 2859d0debff715c5beaccd02b6bebded patch65.tar: 63059 1220 15843 2440 af8c120f86daab9df74998b31927e397Check for the Following: Default accounts with no passwords: 4DGifts, lp, nuucp, demos, tutor, guest, tour
To Disable IP_Forwarding on SGI:
edit /usr/sysgen/master.d
change int ipforwarding = 1 to 0;
then recompile kernel by autoconfig -f; for IRIX 4.0.5
Remove suid from /usr/sbin/colorview
Remove suid from /usr/lib/vadmin/serial_ports on Irix 4.X
Remove suid from /usr/lib/desktop/permissions
Remove suid from /usr/bin/under
/usr/etc/arp is setgid sys in IRIX up to and including 5.2, allowing anyone
who can log into your machine to read files which should be readable only
by group 'sys'.
Remove suid from /usr/sbin/cdinstmgr
Remove suid from /etc/init.d/audio
chmod g-w /usr/bin/newgrp
/usr/sbin/printers has a bug in IRIX 5.2 (and possibly earlier 5.x versions) which allows any user to become root.
/usr/sbin/sgihelp has a bug in IRIX 5.2 (and possibly earlier 5.x versions) which allows any user to become root. This is so bad that the patch is FTPable from ftp.sgi.com:/security/, and SGI is preparing a CD containing only that patch.
The version of inst which comes with patch 34, which is required for installation of all other patches (even those with lower numbers) saves old versions of binaries in /var/inst/patchbase. It does not remove execution or setuid permissions.
Irix has many built-in security knobs that you should know how to turn them on.
Manpage Things to look for ------- --------------------------------------------------- login setup /etc/default/login to log all attempts with SYSLOG=ALL, add support for external authentication programs with SITECHECK=/path/to/prog portmap use '-a mask,match' to restrict most of the portmap services to a subset of hosts or networks use '-v' to log all unprivileged accesses to syslog rshd use '-l' to disable validation using .rhosts files use '-L' to log all access attempts to syslog rlogind use '-l' to disable validation using .rhosts files (beware, this was broken prior to IRIX 5.3) fingerd use '-l' to log all connections use '-S' to suppress information about login status, home directory, and shell use '-f msg-file' to make it just display that file ipfilterd IP packet filtering daemon
The user can cause arbitrary data to be written into the sendmail queue file. Non-privileged users can affect the delivery of mail, as well as run programs as other users.
Workaround
A. Apply the patch for this problem. The patch is available from software.watson.ibm.com. The files will be located in the /pub/aix/sendmail in compressed tar format. The MD5 checksum for the binary file is listed below, ordinary "sum" checksums follow as well.
File sum MD5 Checksum ---- --- ------------ sendmail.tar.Z 35990 e172fac410a1b31f3a8c0188f5fd3edbB. The official fix for this problem can be ordered as Authorized Program Analysis Report (APAR) IX49257
To order an APAR from IBM in the U.S. call 1-800-237-5511 and ask for shipment as soon as it is available (in approximately two weeks). APARs may be obtained outside the U.S. by contacting a local IBM representative.
The following MCG platforms are vulnerable:
R40The following MCG platforms are not vulnerable:
R32 running CNEP add-on product
R3 running CNEP add-on product
R32 not including CNEP add-on product
R3 not including CNEP add-on product
R2
VMEEXEC
VERSADOS
The patch is available and is identified as "patch_43004 p001" or "SCML#5552". It is applicable to OS revisions from R40V3 to R40V4.3. For availability of patches for other versions of the product contact your regional MCG office at the numbers listed below.
Obtain and install the appropriate patch according to the instructions included with the patch.
The patch can be obtained through anonymous ftp from ftp.mcd.mot.com [144.191.210.3] in the pub/patches/r4 directory. The patch can also be obtained via sales and support channels. Questions regarding the patch should be forwarded to sales or support channels.
For verification of the patch file:
Results of sum -r == 27479 661 sum == 32917 661 md5 == 8210c9ef9441da4c9a81c527b44defa6Contact numbers for Sales and Support for MCG:
United States (Tempe, Arizona)
Tel: +1-800-624-0077
Fax: +1-602-438-3865Europe (Brussels, Belgium)
Tel: +32-2-718-5411
Fax: +32-2-718-5566Asia Pacific / Japan (Hong Kong)
Tel: +852-966-3210
Fax: +852-966-3202Latin America / Australia / New Zealand (U.S.)
Tel: +1 602-438-5633
Fax: +1 602-438-3592
The local vulnerability described in the advisory can be exploited in OSF's OSF/1 R1.3 (this is different from DEC's OSF/1). Customers should apply the relevant portions of cert's fix to their source base. For more information please contact OSF's support organization at osf1-defect@osf.org.
The following releases of SCO products are vulnerable to the local problems.
SCO TCP/IP 1.1.x for SCO Unix System V/386 Operating System Release 3.2
Versions 1.0 and 2.0
SCO TCP/IP 1.2.x for SCO Unix System V/386 Operating System Release 3.2
Versions 4.x
SCO TCP/IP 1.2.0 for SCO Xenix System V/386 Operating System Release 2.3.4
SCO Open Desktop Lite Release 3.0
SCO Open Desktop Release 1.x, 2.0, and 3.0
SCO Open Server Network System, Release 3.0
SCO Open Server Enterprise System, Release 3.0
Patches are currently being developed for the release 3.0 and 1.2.1 based products. The latest sendmail available from SCO, on Support Level Supplement (SLS) net382d, is also vulnerable.
Contacts for further information:
e-mail: support@sco.COM
USA, Canada, Pacific Rim, Asia, Latin America 6am-5pm Pacific Daylight Time (PDT)
1-408-425-4726 (voice)
1-408-427-5443 (fax)
Europe, Middle East, Africa: 9am-5:30pm British Standard Time (BST)
+44 (0)923 816344 (voice)
+44 (0)923 817781 (fax)
Sequent customers should contact Sequent Customer Service and request the Fastpatch for sendmail.
phone: 1-800-854-9969.
e-mail:
service-question@sequent.com
At the time of writing of this document, patches/binaries are planned for IRIX versions 4.x, 5.2, 5.3, 6.0, and 6.0.1 and will be available to all SGI customers.
The patches/binaries may be obtained via anonymous ftp (ftp.sgi.com) or from your support/service provider.
On the anonymous ftp server, the binaries/patches can be found in either ~ftp/patches or ~ftp/security directories along with more current pertinent information.
For any issues regarding this patch, please, contact your support/service provider or send email to cse-security-alert@csd.sgi.com .
NEWS-OS 6.0.3 vulnerable; Patch SONYP6022 [sendmail] is available. NEWS-OS 6.1 vulnerable; Patch SONYP6101 [sendmail] is available. NEWS-OS 4.2.1 vulnerable; Patch 0101 [sendmail-3] is available. Note that this patch is not included in 4.2.1a+.Patches are available via anonymous FTP in the /pub/patch/news-os/un-official directory on ftp1.sony.co.jp [202.24.32.18]:
4.2.1a+/0101.doc describes about patch 0101 [sendmail-3] 4.2.1a+/0101_C.pch patch for NEWS-OS 4.2.1C/a+C 4.2.1a+/0101_R.pch patch for NEWS-OS 4.2.1R/RN/RD/aRD/aRS/a+R 6.0.3/SONYP6022.doc describes about patch SONYP6022 [sendmail] 6.0.3/SONYP6022.pch patch for NEWS-OS 6.0.3 6.1/SONYP6101.doc describes about patch SONYP6101 [sendmail] 6.1/SONYP6101.pch patch for NEWS-OS 6.1 Filename BSD SVR4 Checksum Checksum -------------- --------- --------- 4.2.1a+/0101.doc 55361 2 19699 4 4.2.1a+/0101_C.pch 60185 307 25993 614 4.2.1a+/0101_R.pch 35612 502 31139 1004 6.0.3/SONYP6022.doc 03698 2 36652 4 6.0.3/SONYP6022.pch 41319 436 20298 871 6.1/SONYP6101.doc 40725 2 3257 3 6.1/SONYP6101.pch 37762 434 4624 868 MD5 checksums are: MD5 (4.2.1a+/0101.doc) = c696c28abb65fffa5f2cb447d4253902 MD5 (4.2.1a+/0101_C.pch) = 20c2d4939cd6ad6db0901d6e6d5ee832 MD5 (4.2.1a+/0101_R.pch) = 840c20f909cf7a9ac188b9696d690b92 MD5 (6.0.3/SONYP6022.doc) = b5b61aa85684c19e3104dd3c4f88c5c5 MD5 (6.0.3/SONYP6022.pch) = 1e4d577f380ef509fd5241d97a6bcbea MD5 (6.1/SONYP6101.doc) = 62601c61aef99535acb325cf443b1b25 MD5 (6.1/SONYP6101.pch) = 87c0d58f82b6c6f7811750251bace98c
If you need further information, contact your vendor.
Grumman System Support Corporation now performs all Solbourne software and hardware support. Please contact them for further information.
e-mail: support@nts.gssc.com
phone: 1-800-447-2861
Sun has developed patches for all supported platforms and architectures, including Trusted Solaris, Solaris x86, and Interactive Unix. Note that Sun no longer supports the sun3 architecture and versions of the operating system that precede 4.1.3.
Current patches are listed below.
OS version Patch ID Patch File Name ---------- --------- --------------- 4.1.3 100377-19 100377-19.tar.Z 4.1.3_U1 101665-04 101665-04.tar.Z 5.3 101739-07 101739-07.tar.Z 5.4 102066-04 102066-04.tar.Z 5.4_x86 102064-04 102064-04.tar.ZThe patches can be obtained from local Sun Answer Centers and through anonymous FTP from ftp.uu.net in the /systems/sun/sun-dist directory. In Europe, the patches are available from mcsun.eu.net in the /sun/fixes directory.
The patches are also available through the usual URL on World Wide Web.
Sun is issuing Security Bulletin #129 with details on February 22; the patches will become available worldwide during the 24 hours to follow.
Apollo Domain/OS SR10.3 and SR10.3.5 (Fixed in SR10.4)
a88k PD92_P0316
m68k PD92_M0384
Cray Research, Inc. UNICOS 6.0/6.E/6.1 Field Alert #132 SPR 47600
IBM RS/6000 AIX levels 3005, 2006, 2007, and 3.2 apar ix23738
Patches may be obtained by calling Customer Support at 1-800-237-5511.
NeXT Computer, Inc. NeXTstep Release 2.x
Rdist available on the public NeXT FTP archives.
Silicon Graphics IRIX 3.3.x/4.0 (fixed in 4.0.1) Patches may be obtained via anonymous ftp from sgi.com in the sgi/rdist directory.
Solbourne OS/MP 4.1A Patch ID P911121003
Sun Microsystems, Inc. SunOS 4.0.3/4.1/4.1.1 Patch ID 100383-06
Some of the services based on IP authenication are:
You can filter out IP spoofed packets with certian routers with the use of
the input filter. Input filter is a feature on the following routers:
TCP Wrapper is available on ftp.win.tue.nl:/pub/security/tcp_wrappers_6.
3.shar.Z
Identd is available on ftp.lysator.liu.se:/pub/ident/servers
Add the following to TCP Wrappers access list:
Tap is available on
ftp.sterling.com /usenet/alt.sources/volume92/Mar
in the following files:
IP Spoofing Vulnerabilities
IP Spoofing attacks allow an intruder to send packets as if they were
coming from a trusted host and some services based on IP based authenication
allow an intruder to execute commands. Because these packets appear to
come from a trusted host, it may be possible to by-pass firewall security.
IP Spoofing is more detailed in the following papers:
It can help turn off these services especially Rsh and Rlogin.
TCP Wrapper in conjunction with Identd can help to stop IP spoofing
because then the intruder must not not only spoof the connection to Rsh/Rlogin,
they must spoof the information to identd which is not as trivial.
ALL: UNKNOWN@ALL: DENY
This will drops all TCP connections where ident lookup fails.
Hijacking terminal connections
Intruders are using a kernel module called TAP that initially was used for
capturing streams which allows you to view what a person is typing.
You can use it to write to someone's steam,
thus emulating that person typing a command and allowing an intruder to "hijack"
their session.
An intruder needs to install TAP as root. Therefore if you have installed
all patches and taken the necessary precautions to eliminate ways to obtain
root, the intruder has less chance of installing TAP.
You can disable loadable modules on SunOs 4.1.x by editing the kernel
configuraion file found in /sys/`arch -k`/conf directory and comment out the
following line with a "#" character:
options VDDRV # loadable modules
Then build and install the new kernel:
# /etc/config CONFIG_NAME
Reboot the system to activate the new kernel. You can also try to detect
the Tap program by doing the following command:
# cd ../CONFIG_NAME
# make
# cp /vmunix /vmunix.orig
# cp vmunix /
# sync; sync; sync
modstat
Modstat displays all loaded modules. An intruder could trojan modstat as well therefore you may want to verify the
checksum of modstat.
Part 4 - Unpatched Vulnerabilities
This is intended to let consumers know that these holes have already been
fully disclosed and everyone already knows about it. These are the
vulnerabilities that vendors are suppose to be releasing patches for
ASAP. Hopefully this list will stay short and small.
Vendor Bug Result
Sun5.x no promisc flags Can not tell if machine is capturing packets