patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			118 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			118 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
-----BEGIN PGP SIGNED MESSAGE-----
 | 
						|
 | 
						|
=============================================================================
 | 
						|
FreeBSD-SA-96:16					    Security Advisory
 | 
						|
Revised: Fri Jul 12 09:32:53 PDT 1996				FreeBSD, Inc.
 | 
						|
 | 
						|
Topic:		security vulnerability in rdist
 | 
						|
 | 
						|
Category:	core
 | 
						|
Module:		rdist
 | 
						|
Announced:	1996-07-12
 | 
						|
Affects:	FreeBSD 2.0, 2.0.5, 2.1, 2.1-stable, and 2.2-current
 | 
						|
Corrected:	2.1-stable and 2.2-current as of 1996-07-11
 | 
						|
Source:		4.4BSD (lite)
 | 
						|
FreeBSD only:	no
 | 
						|
 | 
						|
Patches:	ftp://freebsd.org/pub/CERT/patches/SA-96:16/
 | 
						|
Reference:	[8lgm]-Advisory-26.UNIX.rdist.20-3-1996
 | 
						|
 | 
						|
=============================================================================
 | 
						|
 | 
						|
I.   Background    
 | 
						|
 | 
						|
     A bug was found in the BSD rdist utility which can allow
 | 
						|
     an unprivileged local user to gain unauthorized access.
 | 
						|
     This problem is present in all source code and binary
 | 
						|
     distributions of FreeBSD version 2.x released before 1996-07-12.
 | 
						|
 | 
						|
     rdist has been the subject of security vulnerabilities in the past.
 | 
						|
     This is a newly discovered vulnerability not related to previous
 | 
						|
     race conditions fixed in rdist.
 | 
						|
 | 
						|
 | 
						|
II.  Problem Description
 | 
						|
 | 
						|
     rdist creates an error message based on a user provided string,        
 | 
						|
     without checking bounds on the buffer used.  This buffer is            
 | 
						|
     on the stack, and can therefore be used to execute arbitrary           
 | 
						|
     instructions.
 | 
						|
 | 
						|
 | 
						|
III. Impact
 | 
						|
 | 
						|
     This vulnerability can allow a local user to obtain superuser
 | 
						|
     privileges.  It may only be exploited by users with a valid
 | 
						|
     account on the local system.  It is present in almost all BSD
 | 
						|
     derived operating systems with a "setuid" rdist program.
 | 
						|
 | 
						|
 | 
						|
IV. Workaround
 | 
						|
 | 
						|
     The rdist program must be setuid root to function properly.
 | 
						|
     This vulnerability can be eliminated by making rdist not
 | 
						|
     executable by unprivileged users.  Since this limits the
 | 
						|
     usefulness of the program, a software update is advised.
 | 
						|
 | 
						|
     This workaround will work for all versions of FreeBSD affected
 | 
						|
     by this problem.
 | 
						|
     
 | 
						|
     As root, execute the commands:
 | 
						|
 | 
						|
	# chflags noschg /usr/bin/rdist
 | 
						|
	# chmod u-s,go-rx /usr/bin/rdist
 | 
						|
 | 
						|
     then verify that the setuid permissions of the files have been
 | 
						|
     removed.  The permissions array should read "-r-x------" as
 | 
						|
     shown here:
 | 
						|
 | 
						|
	# ls -l /usr/bin/rdist
 | 
						|
	-r-x------  1 root  bin  49152 Jun 16 10:46 rdist
 | 
						|
 | 
						|
 | 
						|
V. Solution(s)
 | 
						|
 | 
						|
     Apply the available via FTP from the patch directory noted
 | 
						|
     at the top of this message.  Recompile, and reinstall the
 | 
						|
     rdist program.  This patch is known to apply to all
 | 
						|
     FreeBSD 2.x systems, it has not been tested with FreeBSD 1.x.
 | 
						|
 | 
						|
     The [8lgm] organization correctly points out that this program
 | 
						|
     does not have a particularly good security "history."  While
 | 
						|
     the patch for this vulnerability does solve this particular
 | 
						|
     problem, it's not clear if other security issues involving rdist
 | 
						|
     will appear in the future.
 | 
						|
 | 
						|
     Administrators should consider whether it is appropriate to
 | 
						|
     remove the standard rdist program and upgrade to rdist
 | 
						|
     version 6, which is available as a FreeBSD port.
 | 
						|
 | 
						|
     FreeBSD, Inc. has not replaced the standard BSD rdist with
 | 
						|
     the newer code because the new rdist is not protocol-compatible
 | 
						|
     with the original version.
 | 
						|
 | 
						|
 | 
						|
=============================================================================
 | 
						|
FreeBSD, Inc.
 | 
						|
 | 
						|
Web Site:			http://www.freebsd.org/
 | 
						|
Confidential contacts:		security-officer@freebsd.org
 | 
						|
PGP Key:			ftp://freebsd.org/pub/CERT/public_key.asc
 | 
						|
Security notifications:		security-notifications@freebsd.org
 | 
						|
Security public discussion:	security@freebsd.org
 | 
						|
 | 
						|
Notice: Any patches in this document may not apply cleanly due to
 | 
						|
        modifications caused by digital signature or mailer software.
 | 
						|
        Please reference the URL listed at the top of this document
 | 
						|
        for original copies of all patches if necessary.
 | 
						|
=============================================================================
 | 
						|
 | 
						|
-----BEGIN PGP SIGNATURE-----
 | 
						|
Version: 2.6.2
 | 
						|
 | 
						|
iQCVAwUBMeaC1FUuHi5z0oilAQHtzQP/U1f9y0R+upwCs5IFeBCUBVkFWUeJ/Wwb
 | 
						|
CJPFmsBr54quI6Aie/LXa/Qw8EdrL54GIiNDZYkAzb9XvWOehOsmtoYN4oj0JAbJ
 | 
						|
lesq746xOEfNMtpL866T8dxJRTsK98VMSaZK5IU8fVpVYUURcVDv+y+bqfL72Mst
 | 
						|
3ajof2ieNxE=
 | 
						|
=j2z5
 | 
						|
-----END PGP SIGNATURE-----
 |