漏洞信息详情
AIX login登录参数处理漏洞
- CNNVD编号:CNNVD-199405-004
- 危害等级: 超危
- CVE编号:
CVE-1999-0113
- 漏洞类型:
- 发布时间:
1994-05-23
- 威胁类型:
远程
- 更新时间:
2012-11-28
- 厂 商:
ibm - 漏洞来源:
Linux Usenet Admin… -
漏洞简介
rlogin的一些实现中存在漏洞。攻击者利用该漏洞用‘-froot’参数,根权限访问。
漏洞公告
临时解决方法:
如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
* H Morrow Long <long-morrow@cs.yale.edu>提供如下脚本解决这个问题:
#!/bin/sh
#
# H. Morrow Long, Yale CSCF
#
# Version “tsm-3.2.0”.
AIX_VERSION=”tsm-3.2.0″
#
# Patch path directory /cs/local/src/AIX/rlogin/
AIX_PATCH_DIR=”/cs/local/src/AIX/rlogin”
AIX_TSM_PATCH=”$AIX_PATCH_DIR/$AIX_VERSION”
# Root should NOT be allowed to rlogin as user ROOT anyway! DISABLE root rlogin
#
chuser rlogin=’false’ root
#
#
# 1. As root, edit /etc/inetd.conf
# Comment out the line ‘login … rlogin’
sed ‘s/^login/# login/’ /etc/inetd.conf > /tmp/inetd.conf.NEW
cp -p /etc/inetd.conf /etc/inetd.conf.BACKUP
cp /tmp/inetd.conf.NEW /etc/inetd.conf
# 2. Run ‘inetimp’
inetimp
# 3. Run ‘refresh -s inetd’
refresh -s inetd
#
#
#
# APAR IX44254 — rlogin security hole
#
# This document describes how to apply the emergency patch for APAR
# IX44254. This emergency patch is not the permanent solution to this
# problem, it merely provides a means to restore rlogin functionality
# in a more secure manner.
#
# Begin by identifying the correct level for your system. The command
# “oslevel” may be used for this purpose on AIX v3.2 systems. For AIX
# v3.1 systems you must know the last maintenance level which was
# applied.
#
# If the “oslevel” command returns “oslevel: not found” or a similar
# message from the shell, you must use “tsm-3.2.0”.
#
# If the “oslevel” command returns “<3240” or “<>3240”, you must use
# “tsm-3.2.0”.
#
# If the “oslevel” command returns “=3240”, “>3240”, “<3250” or “<>3250”,
# you must use “tsm-3.2.4”.
#
# If the “oslevel” command returns “=3250” or “>3250”, you must use
# “tsm-3.2.5”.
#
#
# Once you have determined the correct version, execute the following
# steps.
#
# 1). “cd /usr/sbin”
cd /usr/sbin
# 2). If the file “tsm.ix44254” does not exist, execute “mv tsm tsm.ix44254”
mv tsm tsm.ix44254
# 3). “cp
# “tsm-3.2.0”.
# cp /cs/local/src/AIX/rlogin/tsm-3.2.0 ./tsm
cp “${AIX_TSM_PATCH}” ./tsm
# 3). “rm -f login getty”
rm -f login getty
# 4). “chown root.security tsm”
chown root.security tsm
# 5). “chmod 4554 tsm”
chmod 4554 tsm
# 6). “ln tsm login”
ln tsm login
# 7). “ln tsm getty”
ln tsm getty
# 8). “chmod a-x tsm.ix44254”
chmod a-x tsm.ix44254
#
cp -p /etc/inetd.conf.BACKUP /etc/inetd.conf
# 2. Run ‘inetimp’
inetimp
# 3. Run ‘refresh -s inetd’
refresh -s inetd
#
#
# You may verify that the new login command is working correctly with the
# command
#
# rlogin localhost
rlogin localhost
厂商补丁:
IBM
—
IBM AIX 4.1及以上版本已经不存在这个漏洞,请联系厂商:
http://www.ers.ibm.com/” target=”_blank”>