Date: 11 February 1999
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-1999.019 -- Compaq Advisory SSRT0583U
Potential Security Vulnerability in "at" & "inc"
11 February 1999
===========================================================================
Compaq has released the following security advisory concerning a potential
security vulnerability discovered in the "at" and "inc" commands where, under
certain circumstances, a user may gain unauthorised privileges.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Subj: COMPAQ COMPUTER CORPORATION ADVISORY SSRT0583U
* No Restrictions For Distribution *
______________________________________________________________
DATE:
08 FEB 1999
TITLE: DIGITAL UNIX at & inc V4.0, V4.0a, V4.0b, V4.0c,
V4.0d, V4.0e
- Potential Security Vulnerability
ref#: SSRT0583U "at" & "inc"
SOURCE: Compaq Computer Corporation
Software Security Response Team
"Compaq is broadly distributing this Security Advisory in order
to bring to the attention of users of Compaq products the
important security information contained in this Advisory.
Compaq recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Compaq does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Compaq will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
- - ----------------------------------------------------------------------
IMPACT:
A potential potential security vulnerability has been discovered
with the "at" and "inc" for Compaq's Tru64/DIGITAL UNIX software,
where under certain circumstances, an user may gain
unauthorized privileges.
- - ----------------------------------------------------------------------
RESOLUTION:
This potential security problem has been resolved and a
patch for this problem has been made available for
Compaq's Tru64/DIGITAL UNIX V4.0 to V4.0e
*This solution will be included in the next distributed release of
Compaq's Tru64/DIGITAL UNIX
The patch may be obtained from the World Wide Web at the
following FTP address:
http://www.service.digital.com/html/patch_service.html
Use the Browse Patch Tree access option, select DIGITAL_UNIX
directory then choose the appropriate version directory
and download the patch accordingly.
Note: [1] The appropriate patch kit must be installed
following any upgrade to V4.0a, V4.0b, or V4.0c,
V4.0d, V4.0e. If you upgrade from one version to
another, i.e., V4.0b to V4.0d you should re-install
these patches.
[2] IMPORTANT - Please review the appropriate
release notes prior to installation of this patch.
Additional Considerations:
The following components are updated by these patches:
/usr/bin/at (the "at" command)
/usr/bin/mh/inc (The MH message handling system's "inc" command)
/usr/shlib/libmh.so (The MH shared library)
If you believe you have, or aren't sure if you have, previously
installed a patch to any of these modules you should contact your
normal Compaq Services support channel.
Compaq appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Compaq urges you to periodically review your system
management and security procedures.
Compaq will continue to review and enhance the security
features of its products and work with customers to maintain and
improve the security and integrity of their systems.
___________________________________________________________
Copyright (c) Compaq Computer Corporation, 1999 All
Rights Reserved.
Unpublished Rights Reserved Under The Copyright Laws Of
The United States.
___________________________________________________________
Acknowledgments ---
Compaq wishes to thank Lamont Granquist and others for their
assistance in this matter.
- -----BEGIN PGP SIGNATURE-----
Version: 2.7.1
iQCVAwUBNsGJugPNirVrNAlNAQGWXAP/Wk5zloM9U9BLBxHi9hVcXKQRwbirLWVs
RadUTS8fz2pbs4klCoBNkIQDPn6ole1U3B5wrlO0r71sEP/eSsGFWkoUH0W1LDzL
ExdxzTNdNqzPrBxoh9RYBqCTvqz9SCbNJjju7oxT/8k4KOTZqW5a1OjpGbfZugrd
1jo6fJ0JpCY=
=rHVa
- -----END PGP SIGNATURE-----
- ---------------------------END INCLUDED TEXT---------------------
===========================================================================
This security bulletin is provided as a service to AusCERT's members.
As AusCERT did not write the document quoted above, AusCERT has
had no control over its content. The decision to use any or all
of this information is the responsibility of each user or organisation,
and should be done so in accordance with site policies and procedures.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBNsPtNyh9+71yA2DNAQHkHgP8Dr0NVi/b2n8MYBxW2N3Ccibs5aVotK1w
lRev2dSCMRoC3zGl8yLgtmvdziTYG/bJVuX7EqaxDwSDpGy51WomvRM55MYS6ZOo
EPRGX68iPUZKicEnzbGHm7R68gUq7gtVfNlWRG9NNtgSWTqltqdZpeCjSRi9WPay
JHZdPDHZOUY=
=YBFK
-----END PGP SIGNATURE-----
|