漏洞信息详情
ULTRIX /usr/bin/mail漏洞
- CNNVD编号:CNNVD-199108-001
- 危害等级: 中危
- CVE编号:
CVE-1999-1415
- 漏洞类型:
未知
- 发布时间:
1991-08-23
- 威胁类型:
本地
- 更新时间:
2005-10-20
- 厂 商:
digital - 漏洞来源:
-
漏洞简介
DEC ULTRIX 4.2之前版本中的/usr/bin/mail存在漏洞。本地用户可以借助该漏洞提升特权。
漏洞公告
Digital has corrected the identified code as of ULTRIX Version 4.2
(released May 1991). Digital recommends strongly that you upgrade to
ULTRIX Version 4.2 immediately to avoid any potential vulnerability
to your system via this problem. For those of you who are unable to
upgrade at this time, installing the ULTRIX Version 4.2 mail file on
your V4.1 system will correct this problem.
ULTRIX Version 4.2 of /usr/bin/mail has not been shown to be
compatible with versions of ULTRIX previous to ULTRIX version 4.1;
upgrading to ULTRIX V4.2 or upgrading to ULTRIX V4.1 and using the
ULTRIX 4.2 /usr/bin/mail program is required to correct this
problem.
Use one of the procedures below to update an ULTRIX Version 4.1 system:
– Procedure (1) describes the process to extract the
/usr/bin/mail binary from the ULTRIX Version 4.2 MUP subset.
– Procedure (2) provides the commands to install the
ULTRIX Version 4.2 /usr/bin/mail binary from another of your
system(s) where possible.
– Both the VAX (DECsystem) and DEC RISC (DECstation)
versions of the ULTRIX Version 4.2 /usr/bin/mail binary,
may be obtained by contacting your Digital Services Support
Organization.
– ——————————————————————————
–
(1) This procedure will replace your existing /usr/bin/mail binary using
the /usr/bin/mail binary from the ULTRIX Version 4.2 MUP distribution.
The procedure below describes the method to extract the binary from
the tape media.
NOTE:
Setting the environment to single user mode will prevent possible
disruption of the mail services.
– ——————————————————————————
–
To update an ULTRIX Version 4.1 system, you must first obtain the
ULTRIX Version 4.2 binary of /usr/bin/mail for your computer’s
architecture from your ULTRIX Version 4.2 distribution tapes.
LOAD THE ULTRIX MANDATORY UPGRADE TAPE ON YOUR ULTRIX Version 4.1 SYSTEM.
( Note: UDTBASE421 will provide the RISC base upgrade, ULTBASE421 will)
( provide the VAX base upgrade mail file. Substitute as necessary for)
( your architecture. )
( ISSUE THE FOLLOWING COMMANDS FROM YOUR ULTRIX Version 4.1 SYSTEM )
( BECOME ROOT – YOU MUST HAVE PRIVILEGES TO MAKE THIS UPDATE. )
% su
(cd TO SOME DIRECTORY THAT YOU CAN PUT THE FILE IN TEMPORARILY, e.g. cd /tmp)
# cd /tmp
(NOTE: YOU WILL NEED APPROXIMATELY 2 MB of DISK SPACE )
# mkdir ./usr
# mkdir ./usr/etc
# mkdir ./usr/etc/subsets
# setld -x /dev/nrmt0h {UDTBASE421 or ULTBASE421}
( LIST THE SUBSET, CREATE THE FILE UDTBASE421 or ULTBASE0421, THEN EXTRACT )
( THE MAIL FILE /usr/bin/mail {NOTE} THIS EXAMPLE USES THE “RISC” SUBSET )
# ls
# mv UDTBASE421 UDTBASE421.Z
# zcat UDTBASE421.Z | tar xvf – ./usr/bin/mail
( MOVE THE ULTRIX V4.2 BINARY TO /usr/bin/mail CHANGE PROTECTION, OWNER etc.)
# cd /usr/bin
# mv mail mail.old
# chmod 600 mail.old
# mv /tmp/usr/bin/mail .
# chown root mail
# chgrp kmem mail
# chmod 6755 mail
– ——————————————————————————
–
(2) To update the /usr/bin/mail binary from an existing V4.2
(similar platform (VAX or RISC)) remote node, copy the
file to your system and store it in a temporary location
(e.g., – /tmp/mail).
The procedure below provides an example using DECnet. Use the
copy command that fits your environment to copy the /usr/bin/mail
binary from a remote node to the /tmp directory on your local
system.
NOTE:
Setting the environment to single user mode will prevent possible
disruption of the mail services.
– ——————————————————————————
–
% dcp -iv {remote-nodename}/{username}/{password}::’/usr/bin/mail’ ‘/tmp/mail’
( ISSUE THE FOLLOWING COMMANDS FROM YOUR ULTRIX Version 4.1 SYSTEM )
( BECOME ROOT – YOU MUST HAVE PRIVILEGES TO MAKE THIS UPDATE. )
% su
# cd /usr/bin
# mv mail mail.old
# chmod 600 mail.old
( MOVE THE ULTRIX V4.2 BINARY TO /usr/bin/mail CHANGE PROTECTION, OWNER etc.)
# mv /tmp/mail /usr/bin/mail
# chown root mail
# chgrp kmem mail
# chmod 6755 mail
参考网址
来源:CERT/CC Advisory: CA-91.13.Ultrix.mail.vulnerability
名称: CA-91.13
链接:http://www.cert.org/advisories/CA-91.13.Ultrix.mail.vulnerability
来源: BID
名称: 27
链接:http://www.securityfocus.com/bid/27