Fwd: Sun Security Bulletin #00191

1999-12-29 Thread Bryan Blackburn
- Forwarded message from Sun Security Coordination Team <[EMAIL PROTECTED]> - Date: Wed, 29 Dec 1999 11:17:03 -0800 (PST) From: Sun Security Coordination Team <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Sun Security Bulletin #00191 -BEGIN PGP SIGNED MESSAGE-

Fwd: Sun Security Bulletin #00192

1999-12-29 Thread Bryan Blackburn
- Forwarded message from Sun Security Coordination Team <[EMAIL PROTECTED]> - Date: Wed, 29 Dec 1999 11:35:49 -0800 (PST) From: Sun Security Coordination Team <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Sun Security Bulletin #00192 -BEGIN PGP SIGNED MESSAGE-

Re: majordomo local exploit

1999-12-29 Thread Brock Sides
A note to anybody applying this, via patch or otherwise. Don't keep the original resend lying around in the majordomo directory: wrapper assumes everything in that directory is secure, and will gladly execute it. [brock@o2 brock]$ /usr/freeware/majordomo/wrapper resend.orig '@|id' uid=1126(majord

Re: Wmmon under FreeBSD

1999-12-29 Thread Greg A. Woods
[ On Friday, December 24, 1999 at 20:27:01 (+), Dominic Mitchell wrote: ] > Subject: Re: Wmmon under FreeBSD > > Under modern BSD4.4, the preferred method is using sysctl(3),(8), as > opposed to kernfs. That's not completely true and misses the bigger picture entirely. According to McKusick,

The "Mac DoS Attack," a Scheme for Blocking Internet Connections

1999-12-29 Thread John Copeland
SecurityFocus, * I have discovered that Macintosh computers running OS9 can be used to direct a stream of 1500-byte ICMP datagrams at a target on the Internet. * These ICMP datagrams or triggered by 40-byte datagrams, so one "controller" computer with a 1.3 Mbps Internet connection can focus th

Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A

1999-12-29 Thread Ussr Labs
Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A USSR Advisory Code: USSR-99027 Release Date: December 29, 1999 [3/5] Systems Affected: CSM Mail Server for Windows 95/NT and others old versions. Version: 2000-01A Version: 1999-07M Version: 1999-07I Version: 1999-0

Re: majordomo local exploit

1999-12-29 Thread Olaf Kirch
While browsing the majordomo lists trying to find out if anyone is taking care of this issue, I came across another that's in their archive (appended below). The comment of Dave Wolfe was that you shouldn't let untrusted users run programs on his majordomo server. Olaf -- Olaf Kirch | -

AltaVista

1999-12-29 Thread rudi carell
good morning folks, ... "With AltaVista Search Software, you can create your own search and retrieval Web site with the same relevancy, performance, and efficiency of the powerful AltaVista Search engine (www.altavista.com) used to index the World Wide Web" ... yes thats true .. but, if you t

Re: majordomo local exploit

1999-12-29 Thread Spidey
It would be important to note that on POSIX systems, the wrapper is compiled to setuid() to the majordomo user, so this won't give a root shell... On other systems, you are advised to install majordomo suid 'majordomo' instead of root. >From the "INSTALL" file: 3) Edit the Makefile, defining wh

Re: majordomo local exploit

1999-12-29 Thread Henrik Edlund
> - -snip- > > # If the first argument is "@filename", read the real arguments > # from "filename", and shove them onto the ARGV for later processing > # by &Getopts() > # > if ($ARGV[0] =~ /^\@/) { > $fn = shift(@ARGV); > $fn =~ s/^@//; > open(AV, $fn) || die("open(AV, \"$fn\"): $!\nS

Re: majordomo local exploit

1999-12-29 Thread Taneli Huuskonen
-BEGIN PGP SIGNED MESSAGE- "Todd C. Miller" <[EMAIL PROTECTED]> wrote: > For those using perl 5.x, you can use sysopen() instead of the "magic" > perl open() to fix this. I'm afraid that wouldn't help much, as you can supply any pathname as the -C (configuration file) argument:

Re: UnixWare local pis exploit (mkpis as well)

1999-12-29 Thread Brock Tellier
As a bonus, /usr/local/bin/mkpis is vulnerable to the same /tmp symlink problem. It has the same permissions as pis. -Brock --- Brock Tellier <[EMAIL PROTECTED]> wrote: Greetings, OVERVIEW A vulnerability in "/usr/local/bin/pis" on SCO UnixWare will allow any user to create arbitrary files wi

Re: majordomo local exploit

1999-12-29 Thread Christopher X. Candreva
On Tue, 28 Dec 1999, Brock Tellier wrote: > but wrapper immediatly setuid()'s and setgid()'s to owner:daemon before > execing the wrapped program. Bugs in resend aside, this appears to be an incorrect configuration of wrapper. majordomo should have it's own group as well as user, and it should

CERT Advisory CA-99-17 Denial-of-Service Tools

1999-12-29 Thread Aleph One
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Note -- On Tuesday, December 28, 1999, beginning at 6:00 PM Eastern Daylight Time (18:00 EST, GMT-5), the CERT Web and FTP sites will be unavailable for several hours while routine maintenance is done. CERT(R) Advisory CA-99-

Re: majordomo local exploit

1999-12-29 Thread Christopher Schulte
At 08:47 PM 12/28/1999 -0600, Brock Tellier wrote: >I've only tested the version of majordomo which comes with UnixWare >7.1 which is 1.94.4. This vulnerability may or not still be present >in newer versions of majordomo, but it exists on the default UW7.1 >installation. Confirmed with *sto

Re: majordomo local exploit

1999-12-29 Thread Todd C. Miller
For those using perl 5.x, you can use sysopen() instead of the "magic" perl open() to fix this. - todd --- resend Thu Aug 19 10:12:03 1999 +++ resend+ Tue Dec 28 23:55:39 1999 @@ -58,7 +58,7 @@ if ($ARGV[0] =~ /^\@/) { $fn = shift(@ARGV); $fn =~ s/^@//; -open(AV, $fn) ||