copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
» AA-96.11 -- SGI IRIX cdplayer Vulnerability
AA-96.11 -- SGI IRIX cdplayer Vulnerability
Date:
20 March 1998
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AA-96.11 AUSCERT Advisory SGI IRIX cdplayer Vulnerability 22 November 1996 Last Revised: 20 March 1998 Changed Section 3 to include vendor patch and bulletin information. A complete revision history is at the end of this file. - --------------------------------------------------------------------------- AUSCERT has received information that there is a vulnerability in the "cdplayer" program distributed with IRIX 5.x and 6.x. cdplayer(1) is a Motif based control panel used for playing audio compact disks. This vulnerability may allow local users to gain root privileges. Exploit details involving this vulnerability have been widely distributed. This vulnerability can be exploited without a CD-ROM drive being attached to the machine being attacked. Vendor patches have been released addressing this vulnerability. AUSCERT recommends that sites take the steps outlined in section 3 as soon as possible. This advisory will be updated as new information becomes available. - --------------------------------------------------------------------------- 1. Description cdplayer(1) is a program that creates a Motif based control panel used for playing audio Compact Discs on a CD-ROM drive. There is a vulnerability in cdplayer that allows directories to be created anywhere on the system. These directories are created using root privileges with permissions following the umask of the person running the program. Exploit details involving this vulnerability have been made publicly available. Sites should note that a CD-ROM drive does not need to be attached for this vulnerability to be exploited. This program may be installed under both IRIX 5.x and 6.x. By default, it is installed under /usr/bin/X11/cdplayer. To determine whether the cdplayer program is installed, sites should check for its presence with the command: % ls -l /usr/bin/X11/cdplayer If this program is installed, sites should take the actions recommended in Section 3 immediately. 2. Impact Local users may be able to create arbitrary directories anywhere on the system. This may be leveraged to gain root privileges. 3. Workarounds/Solution Official vendor patches have been released by Silicon Graphics which address this vulnerability (Section 3.2). If the patches recommended by Silicon Graphics cannot be applied, AUSCERT recommends that sites prevent the exploitation of this vulnerability by immediately applying the workaround given in Section 3.1. 3.1 Remove setuid and execute permissions To prevent the exploitation of the vulnerability described in this advisory, sites should remove the setuid root and execute permissions from cdplayer. To do this, the following command should be run as root: # /bin/chmod 400 /usr/bin/X11/cdplayer # ls -l /usr/bin/X11/cdplayer -r-------- 1 root sys 127648 Jul 17 12:28 /usr/bin/X11/cdplayer Note that this will remove the ability for users to run this program. 3.2 Install vendor patches Silicon Graphics has released a security bulletin containing information about and patch details for similar vulnerabilities affecting a number of related programs including cdplayer(1). The original release of this bulletin can be retrieved from: ftp://sgigate.sgi.com/security/19980301-01-PX Information on patches which address the vulnerability described in this advisory has been extracted from the SGI bulletin and is listed below. OS Version Vulnerable? Patch # Other Actions ---------- ----------- ------- ------------- IRIX 3.x no IRIX 4.x no IRIX 5.0.x yes not avail Note 1 IRIX 5.1.x yes not avail Note 1 IRIX 5.2 yes not avail Note 1 IRIX 5.3 yes 2563 IRIX 6.0.x yes not avail Note 1 IRIX 6.1 yes not avail Note 1 IRIX 6.2 yes 2564 IRIX 6.3 yes 2565 IRIX 6.4 yes 2291 NOTES 1) upgrade operating system or see "Temporary Solution" section. "Temporary Solution" refers to the SGI bulletin but is equivalent to the suggestions given in our AUSCERT advisory in section 3.1. These patches can be retrieved from: ftp://sgigate.sgi.com/patches/ - --------------------------------------------------------------------------- The AUSCERT team have made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The appropriateness of this document for an organisation or individual system should be considered before application in conjunction with local policies and procedures. AUSCERT takes no responsibility for the consequences of applying the contents of this document. If you believe that your system has been compromised, contact AUSCERT or your representative in FIRST (Forum of Incident Response and Security Teams). AUSCERT is located at The University of Queensland within the Prentice Centre. AUSCERT is a full member of the Forum of Incident Response and Security Teams (FIRST). AUSCERT maintains an anonymous FTP service which is found on: ftp://ftp.auscert.org.au/pub/. This archive contains past SERT and AUSCERT Advisories, and other computer security information. AUSCERT also maintains a World Wide Web service which is found on: http://www.auscert.org.au/. Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 4477 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AUSCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. Postal: Australian Computer Emergency Response Team c/- Prentice Centre The University of Queensland Brisbane Qld. 4072. AUSTRALIA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Revision History 20 March 1998 Silicon Graphics has released a security bulletin addressing the vulnerability described in this advisory. Section 3 has been modified to include vendor patch information. 10 December 1996 -- Removed comment in Section 3.1 about using cdman(1) if the playing of audio compact disks was essential. cdman(1) has since been found to be vulnerable (see AUSCERT Advisory AA-96.20 SGI IRIX datman/cdman Vulnerability). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBNRJyeih9+71yA2DNAQHxnwP/ZD/eGi/o2pnrP8qnWc+az4Vprjk4Wkbs 55tS68Q01PbniIP70O+/OoyUuY+RhW8EADMuFOHrvqtqU/tPXL3U7cSTgFs5sCfH ql7El6Z0jQk9op/RoEjzaEK0VOuc5p1Oy+hL5cLU1vFgsGZKrib7rAtOpUHJf+mn iYpivWcbNeg= =hWpm -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=1&it=1864