SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Taylor UUCP Vendors:   Taylor, Ian Lance
(Red Hat Issues Fix) Taylor UUCP Input Validation Flaw Allows Local Users to Elevate Privileges
SecurityTracker Alert ID:  1002696
SecurityTracker URL:  http://securitytracker.com/id/1002696
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Nov 3 2001
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): uucp-1.06.1-25
Description:   A vulnerability was reported in Taylor UUCP. An argument handling flaw in a component of the Taylor UUCP package allows local users to obtain 'uucp' user and group privileges.

The uuxqt module (the UUCP execution daemon), which is designed to remove arguments that appear dangerous before execution, reportedly fails to remove long arguments. This allows a local user to cause cammands to be executed on the system with uucp privileges.

On OpenBSD 2.8 (and probably others), this reportedly indirectly allows root compromise. A local user can exploit the vulnerability to overwrite the uucp owned program /usr/bin/uustat, where arbitrary commands may be executed as part of the /etc/daily crontab script.

On Redhat 7.0 (and probably others), this reportedly indirectly allows a local user to create empty files as root execute commands as if logged in at the console.

Additional demonstration exploit information is provided in the Source Message.

Impact:   A local user can cause arbitrary commands to be executed on the system with 'uucp' user and group privileges, giving the local user 'uucp' level permissions on the system.
Solution:   The vendor has released a fix.

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm

The verification checksums are:

MD5 sum Package Name
--------------------------------------------------------------------------
50fbf0b59533287c6ca7f2e831097ca1 6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm
fc1f7b4b390e55623a4f112d6d22df3f 6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm
02df074653c0f12c1ff91623068e37b7 6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm
ebb4943126a26503eeb63f69272ced55 6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm
4525cae85645e8b90f3df6e7b304969b 6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm
431a301c54348c1e3db4598a48ed8a7f 6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm
199fef0186401d6aaebad5cb420f1f5a 6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm
6767ded2ab1c9be85ed6bdef3ef99bb0 6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm
88393bda9bdcb8eaff5446ef99706780 6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm
35697b8870fb665ce7bd320ec553406d 6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm
324fe7a1b365aee05ab0ea021e2fa31b 7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm
923fcf52bca69c7e0158694b5d36cff8 7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
e93308a3f78d56128699365c02cc4104 7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
bf73c635ea5ae22e8a807c9b693074b7 7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm
bf77ed26156daf3a677aa5309624b375 7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
e6928929f4eb9f0fd0e1981fa233d421 7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
0ecc7a4a846747b857943b0f90862f32 7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm
324fe7a1b365aee05ab0ea021e2fa31b 7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm
923fcf52bca69c7e0158694b5d36cff8 7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
e93308a3f78d56128699365c02cc4104 7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
bf73c635ea5ae22e8a807c9b693074b7 7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm
bf77ed26156daf3a677aa5309624b375 7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
e6928929f4eb9f0fd0e1981fa233d421 7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
0ecc7a4a846747b857943b0f90862f32 7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm
95bee57049321a71a652378a5d9bc924 7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm
7da94da3bddc150e3c49f8e90c7f08eb 7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm
59d0791af0a8c717d6fdad0e967d823a 7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm

See the Source Message for the vendor's advisory containing directions on how to apply the appropriate fix.

Vendor URL:  www.airs.com/ian/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Red Hat Linux)

Message History:   This archive entry is a follow-up to the message listed below.
Sep 8 2001 Taylor UUCP Input Validation Flaw Allows Local Users to Elevate Privileges



 Source Message Contents

Subject:  [RHSA-2001:101-07] New ucd-snmp package to fix several security vulnerabilities


---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          New ucd-snmp package to fix several security vulnerabilities
Advisory ID:       RHSA-2001:101-07
Issue date:        2001-08-15
Updated on:        2001-10-31
Product:           Red Hat Linux
Keywords:          ucd-snmp security fix
Cross references:  
Obsoletes:         
---------------------------------------------------------------------

1. Topic:

Updated ucd-snmp packages are now available for Red Hat Linux 6.2, 7 and
7.1. These packages include fixes for the following problems:

 - /tmp race and setgroups() privilege problem
 - Various buffer overflow and format string issues
 - One signedness problem in ASN handling

It is recommended that all users update to the fixed packages.

2. Relevant releases/architectures:

Red Hat Linux 6.2 - alpha, i386, sparc

Red Hat Linux 7.0 - alpha, i386

Red Hat Linux 7.1 - alpha, i386, ia64

3. Problem description:

Due to the mentioned security problems a remote attacker might obtain
superuser privileges on a vulnerable host.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):



6. RPMs required:

Red Hat Linux 6.2:

SRPMS:
ftp://updates.redhat.com/6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm

alpha:
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm
ftp://updates.redhat.com/6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm

sparc:
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm



7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
50fbf0b59533287c6ca7f2e831097ca1 6.2/en/os/SRPMS/ucd-snmp-4.2.1-4.6.x.src.rpm
fc1f7b4b390e55623a4f112d6d22df3f 6.2/en/os/alpha/ucd-snmp-4.2.1-4.6.x.alpha.rpm
02df074653c0f12c1ff91623068e37b7 6.2/en/os/alpha/ucd-snmp-devel-4.2.1-4.6.x.alpha.rpm
ebb4943126a26503eeb63f69272ced55 6.2/en/os/alpha/ucd-snmp-utils-4.2.1-4.6.x.alpha.rpm
4525cae85645e8b90f3df6e7b304969b 6.2/en/os/i386/ucd-snmp-4.2.1-4.6.x.i386.rpm
431a301c54348c1e3db4598a48ed8a7f 6.2/en/os/i386/ucd-snmp-devel-4.2.1-4.6.x.i386.rpm
199fef0186401d6aaebad5cb420f1f5a 6.2/en/os/i386/ucd-snmp-utils-4.2.1-4.6.x.i386.rpm
6767ded2ab1c9be85ed6bdef3ef99bb0 6.2/en/os/sparc/ucd-snmp-4.2.1-4.6.x.sparc.rpm
88393bda9bdcb8eaff5446ef99706780 6.2/en/os/sparc/ucd-snmp-devel-4.2.1-4.6.x.sparc.rpm
35697b8870fb665ce7bd320ec553406d 6.2/en/os/sparc/ucd-snmp-utils-4.2.1-4.6.x.sparc.rpm
324fe7a1b365aee05ab0ea021e2fa31b 7.0/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm
923fcf52bca69c7e0158694b5d36cff8 7.0/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
e93308a3f78d56128699365c02cc4104 7.0/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
bf73c635ea5ae22e8a807c9b693074b7 7.0/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm
bf77ed26156daf3a677aa5309624b375 7.0/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
e6928929f4eb9f0fd0e1981fa233d421 7.0/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
0ecc7a4a846747b857943b0f90862f32 7.0/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm
324fe7a1b365aee05ab0ea021e2fa31b 7.1/en/os/SRPMS/ucd-snmp-4.2.1-4.7.x.src.rpm
923fcf52bca69c7e0158694b5d36cff8 7.1/en/os/alpha/ucd-snmp-4.2.1-4.7.x.alpha.rpm
e93308a3f78d56128699365c02cc4104 7.1/en/os/alpha/ucd-snmp-devel-4.2.1-4.7.x.alpha.rpm
bf73c635ea5ae22e8a807c9b693074b7 7.1/en/os/alpha/ucd-snmp-utils-4.2.1-4.7.x.alpha.rpm
bf77ed26156daf3a677aa5309624b375 7.1/en/os/i386/ucd-snmp-4.2.1-4.7.x.i386.rpm
e6928929f4eb9f0fd0e1981fa233d421 7.1/en/os/i386/ucd-snmp-devel-4.2.1-4.7.x.i386.rpm
0ecc7a4a846747b857943b0f90862f32 7.1/en/os/i386/ucd-snmp-utils-4.2.1-4.7.x.i386.rpm
95bee57049321a71a652378a5d9bc924 7.1/en/os/ia64/ucd-snmp-4.2.1-4.7.x.ia64.rpm
7da94da3bddc150e3c49f8e90c7f08eb 7.1/en/os/ia64/ucd-snmp-devel-4.2.1-4.7.x.ia64.rpm
59d0791af0a8c717d6fdad0e967d823a 7.1/en/os/ia64/ucd-snmp-utils-4.2.1-4.7.x.ia64.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001 Red Hat, Inc.



_______________________________________________
Linux-security mailing list
Linux-security@redhat.com
https://listman.redhat.com/mailman/listinfo/linux-security

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC