SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Rsync Vendors:   Caldera/SCO
Caldera Rsync Package Fails to Properly Drop Privileges, Allowing a Local User to Potentially Obtain Elevated Privileges
SecurityTracker Alert ID:  1003972
SecurityTracker URL:  http://securitytracker.com/id/1003972
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 4 2002
Impact:   Root access via local system, User access via local system

Version(s): prior to rsync-2.5.0-5
Description:   Caldera reported a vulnerability in their rsync package. A local user may be able to obtain elevated privileges on the system.

It is reported that rsync does not properly drop supplementary groups to which the rsync daemon belongs (such as root) from the server process before the process performs work as an unprivileged user id (uid) or group id (gid). As a result, a local user may be able to gain elevated privileges on the system. No details were provided.

Caldera credits Ethan Benson with discovering and researching this vulnerability.

Impact:   A local user may be able to obtain elevated privileges on the system, including root level privileges.
Solution:   Caldera has released a fix for OpenLinux:

For OpenLinux 3.1.1 Server

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

2c8f978df12dabf073361c86f7012210 rsync-2.5.0-5.i386.rpm

Install the packages with the following sequence:

rpm -Fvh \
rsync-2.5.0-5.i386.rpm

Source Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

bffd618c0ad88252b35c33ac821253ad rsync-2.5.0-5.src.rpm


For OpenLinux 3.1.1 Workstation:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

2c8f978df12dabf073361c86f7012210 rsync-2.5.0-5.i386.rpm

Install the packages with the following sequence:

rpm -Fvh \
rsync-2.5.0-5.i386.rpm

Source Package Location:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

bffd618c0ad88252b35c33ac821253ad rsync-2.5.0-5.src.rpm

Vendor URL:  www.calderasystems.com/support/security/ (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Caldera/SCO)
Underlying OS Comments:  3.1.1 OpenLinux Server and Workstatoin

Message History:   None.


 Source Message Contents

Subject:  Security Update: [CSSA-2002-014.0] Linux: rsync supplementary groups vulnerability


--pf9I7BMVVzbSWLtt
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 8bit            

To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com

______________________________________________________________________________

		Caldera International, Inc.  Security Advisory

Subject:		Linux: rsync supplementary groups vulnerability
Advisory number: 	CSSA-2002-014.0
Issue date: 		2002, April 03
Cross reference:
______________________________________________________________________________


1. Problem Description

	Supplementary groups to which the rsync daemon belongs (such as
	root) were not removed from the server process before it performed
	work as an unprivileged uid and gid. The rsync daemon was also
	compiled with a vulnerable version of the zlib library. This
	package corrects both these issues.


2. Vulnerable Supported Versions

	System				Package
	-----------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to rsync-2.5.0-5.i386.rpm
					prior to rsync-2.5.0-5.src.rpm

	OpenLinux 3.1.1 Workstation	prior to rsync-2.5.0-5.i386.rpm
					prior to rsync-2.5.0-5.src.rpm


3. Solution

	The proper solution is to install the latest packages.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

	2c8f978df12dabf073361c86f7012210	rsync-2.5.0-5.i386.rpm

	4.2 Installation

	Install the packages with the following sequence:
		
		rpm -Fvh \
			rsync-2.5.0-5.i386.rpm
		
	4.3 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

	bffd618c0ad88252b35c33ac821253ad	rsync-2.5.0-5.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

	2c8f978df12dabf073361c86f7012210	rsync-2.5.0-5.i386.rpm

	5.2 Installation

	Install the packages with the following sequence:
		
		rpm -Fvh \
			rsync-2.5.0-5.i386.rpm
		
	5.3 Source Package Location

	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

	bffd618c0ad88252b35c33ac821253ad	rsync-2.5.0-5.src.rpm


6. References

	Specific references for this advisory:
		none


	Caldera OpenLinux security resources:
		http://www.caldera.com/support/security/index.html

	Caldera UNIX security resources:
		http://stage.caldera.com/support/security/

	This security fix closes Caldera incidents sr862089, fz520415,
	and erg711995.


7. Disclaimer

	Caldera International, Inc. is not responsible for the misuse
	of any of the information we provide on this website and/or
	through our security advisories. Our advisories are a service
	to our customers intended to promote secure installation and
	use of Caldera products.


8. Acknowledgements

	Ethan Benson discovered and researched this vulnerability.

______________________________________________________________________________


--pf9I7BMVVzbSWLtt
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjyrmgoACgkQbluZssSXDTEVcQCg9uiPgzgfPvPXkxJwm1HOXfd5
LAAAn1SreMOXu8Dur7Du2Fg/Z53yyTqr
=hkLL
-----END PGP SIGNATURE-----

--pf9I7BMVVzbSWLtt--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC