Re: Exploit of rpc.cmsd

1999-07-16 Thread Casper Dik
>(What about Solaris 2.4?) Both CDE 1.0.1/1.0.2 (which have seperate rpc.cmsd binaries; these were merged in later releases) and Solaris 2.4 patches will be released at a later date. >Be aware that when these patches[*] are applied, the existing rpc.cmsd >process (if one exists) seems to be kil

Re: Exploit of rpc.cmsd

1999-07-16 Thread Dan Astoorian
On Wed, 14 Jul 1999 04:28:43 EDT, Casper Dik writes: > > The following patches have now been released: > > 107022-03 CDE 1.3 (Solaris 7/SPARC) > 107023-03 CDE 1.3_x86 (Solaris 7/x86) > > 105567-08 CDE 1.2_x86 (Solaris 2.6) > 104976-04 OW 3.5.

Re: Exploit of rpc.cmsd

1999-07-15 Thread Casper Dik
Many people told me that they couldn't find the patches. Not even the one that was supposed to have been released a week ago. >>The following patches have now been released: >> >> 107022-03 CDE 1.3 (Solaris 7/SPARC) These patches should show up on SunSolve shortly; (Ok, so I should h

Re: Exploit of rpc.cmsd

1999-07-14 Thread Casper Dik
>Several exploits for rpc.cmsd seems to be floating around. This >vulnerability is being actively exploited. The vulnerability >is known to exist at least in Solaris 7, possibly in earlier >versions. > >Sun patch 107022-02 does not fix the vulnerability. Sun >has been informed and they are working

Re: Exploit of rpc.cmsd

1999-07-13 Thread Aleph One
Several exploits for rpc.cmsd seems to be floating around. This vulnerability is being actively exploited. The vulnerability is known to exist at least in Solaris 7, possibly in earlier versions. Sun patch 107022-02 does not fix the vulnerability. Sun has been informed and they are working on a p

Re: Exploit of rpc.cmsd

1999-07-13 Thread John Hall
AIL PROTECTED]> > Sent: Monday, July 12, 1999 4:02 PM > Subject: Re: Exploit of rpc.cmsd > > > > > I had both a Solaris V2.5.1 (fully patched as of March 20) and a > > Solaris V2.7 (fully patched as of April 10) broken into. Both had > > CDE and were running rpc.

Re: Exploit of rpc.cmsd

1999-07-13 Thread John Hall
I had both a Solaris V2.5.1 (fully patched as of March 20) and a Solaris V2.7 (fully patched as of April 10) broken into. Both had CDE and were running rpc.cmsd. I know the breakin was either due to rpc.cmsd or rpc.rstatd. Note the breakin occured using high numbered ports. In any case, I have

Re: Exploit of rpc.cmsd

1999-07-12 Thread Andy Polyakov
Hi, everybody! > > The calendar manager (rpc.cmsd) on Solaris 2.5 and 2.5.1 is vulnerable > > to a buffer overflow > > attack... > Can you confirm that compromised system(s) were equipped with CDE? Or in > other words was it /usr/dt/bin/rpc.cmsd that was assigned to do the job > in /etc/inetd.con

Re: Exploit of rpc.cmsd

1999-07-12 Thread Andy Polyakov
> Hi, everybody! > > > > The calendar manager (rpc.cmsd) on Solaris 2.5 and 2.5.1 is vulnerable > > > to a buffer overflow > > > attack... > ... Shall we have a look? Let's 'cm_lookup -c > [EMAIL PROTECTED]' and simultaneously 'truss -p on > 2.6.host: > > ... > statvfs("/var/spool/calendar/callog

Re: Exploit of rpc.cmsd

1999-07-12 Thread Stephen C Woods
105566-06 was installed on our machine that was hit, When I reported it to Sun I recieved e-mail that they are working on a fresh fix, and it'll be available 'soon'. Perhaps this time they'll fix all the buffer overflows. Luckly the twerp that went after my machine was a clueless twit and didn'

Re: Exploit of rpc.cmsd

1999-07-09 Thread Andy Polyakov
Bob! > The calendar manager (rpc.cmsd) on Solaris 2.5 and 2.5.1 is vulnerable > to a buffer overflow > attack... > ... we have seen the > intruder delete administrator > logs, change homepages, and insert backdoors. The attack signature is > similar to the tooltalk attack. Can you confirm that c

Exploit of rpc.cmsd

1999-07-09 Thread Bob Todd
The calendar manager (rpc.cmsd) on Solaris 2.5 and 2.5.1 is vulnerable to a buffer overflow attack. Further, it appears that even patched versions may be vulnerable. Also, rpc.cmsd under Solaris 2.6 could also be problematic. Where possible, it should be disabled in inetd.conf The exploit allo