Search: Home Bugtraq Vulnerabilities Mailing Lists Jobs Tools Beta Programs

Patches for at(C), login(M), prwarn(C), sadc(ADM), pt_chmod
SB-94:01
Published: 1994-11-30 00:00:00
Updated: 1995-04-21 00:00:00

===========================================================================
                         SCO Security Bulletin 94:01
                             November 30th, 1994
                           Updated: April 21st, 1995
          Patches for at(C), login(M), prwarn(C), sadc(ADM), pt_chmod
---------------------------------------------------------------------------

### Updated Information as of April 21st, 1995
###
###     The SSEs listed below have been discontinued. A Support Level
### Supplement, (SLS) has been issued which addresses all of the concerns
### contained herein. The Supplement is:      
### 
### SLS UOD392A: System Security Enhancements
###
### It is available as follows:
### 
### Anonymous ftp:
###
### ftp://ftp.sco.COM/SLS/uod392a.Z             (compressed disk image)
### ftp://ftp.sco.COM/SLS/uod392a.ltr.Z         (compressed cover letter)
### 
### UUCP:
### 
### United States:
###
### sosco!/usr/spool/uucppublic/SLS/uod392a.Z
### sosco!/usr/spool/uucppublic/SLS/uod392a.ltr.Z
###
### United Kingdom:
###
### scolon!/usr/spool/uucppublic/SLS/uod392a.Z
### scolon!/usr/spool/uucppublic/SLS/uod392a.ltr.Z
### 
### See the information below for further information.
###
### end updated information

The Santa Cruz Operation has been informed of the following problems present
in our software.

I.   Description

     The programs at(C), login(M), prwarn(C) sadc(ADM), and pt_chmod
     may each allow unauthorized root access to the system. 

     There are five unrelated issues present, one for each program listed
     above.
  
      
II.  Impact
        
     Any user with an account on the system may obtain root access using
     any one of the programs listed.


III. Releases

     These problems exist on the following releases of SCO Products:

        SCO Unix System V/386 Release 3.2 Versions 4.2, 4.1, and 4.0
        SCO Open Desktop Lite Release 3.0
        SCO Open Desktop Release 3.0 and 2.0
        SCO Open Server Network System Release 3.0
        SCO Open Server Enterprise System Release 3.0

IV. Solution

     SCO is providing the following (S)ystem (S)ecurity (E)nhancements, SSEs,
     to address these problems. These are preliminary patches which SCO
     feels addresses the issues at hand, but these patches have not been
     fully tested and integrated and hence cannot officially be supported.
     Official patches should be available in the near future via a
     (S)upport (L)evel (S)upplement. (SLS). The README file mentioned below
     will be updated when an official Supplement is available.

     Binary             Patch
     ------             ------
     at(C)              sse001
     login(M)           sse002
     prwarn(C)          sse003
     sadc(ADM)          sse004
     pt_chmod           sse005


     These are available at the following sites:

     Anonymous ftp: ftp.sco.COM:/SSE

     UUCP downloading, and SOS access:  sosco (USA), scolon (Europe),
     in the directory /usr/spool/uucppublic/SSE. Note that access to these
     Supplements at scolon may not be available until December 2nd, 1994.

     The filename conventions are as follows:

     ssexxx.tar.Z               - compressed tar file of supplement
     ssexxx.ltr.Z               - compressed cover letter for supplement

        xxx indicates the number of the supplement, i.e. sse001.tar.Z.

     See the README file in the directories listed above for checksum
     information. Connection information is available at the end of this
     document.

     Please note that these Supplements are not generally available from
     SCO on diskette media.

If you have further questions, contact your support provider.  If you
need to contact SCO, please send electronic mail to support@sco.COM, or
contact SCO as follows. 

        USA/Canada: 6am-5pm Pacific Standard Time (PST)
        -----------
        1-800-347-4381  (voice)
        1-408-427-5443  (fax)

        Pacific Rim, Asia, and Latin American customers: 6am-5pm Pacific
        ------------------------------------------------ Standard Time
                                                         (PST)
        1-408-425-4726  (voice)
        1-408-427-5443  (fax)

        Europe, Middle East, Africa: 9am-5:30pm British Standard Time (BST)
        ----------------------------
        +44 (0)923 816344 (voice)
        +44 (0)923 817781 (fax)

Downloading Information
-----------------------

ftp to ftp.sco.com
Login name: ftp
Password: your email address

For anonymous UUCP connection:
------------------------------

For USA, Canada, Pacific Rim, Asia and Latin America customers:

Machine name:  sosco
Login name:  uusls  (fourth character is the letter "l")
No password

List of modems available for UUCP transfer from sosco.sco.com:

Standard V.32, (300-9600bps)     4@   408-425-3502
Hayes V Series 9600              2@   408-427-4470
Telebit Trailblazer                   408-429-1786


For Europe/Middle East/Africa customers there is a system located at
SCO EMEA (London):

Machine name:  scolon
Login name:  uusls
Password:  bbsuucp

List of modems available for UUCP transfer from scolon.sco.com:

Dowty Trailblazer  +44 (0)923 210911



For SCO Online Support (SOS) BBS download:
------------------------------------------

For those customers that have accounts on SOS these files can be
downloaded interactively via X, Y, Z MODEM or Kermit. Follow the
menus selections under "Toolchest" from the main SOS menu.

List of modems available for interactive transfer from sosco.sco.com:

First four are Standard V.32 (300-9600bps)      408-426-9495
Last three are Hayes 2400 compatible 

Telebit Trailblazer                             408-426-9525



For ftp via World Wide Web:
---------------------------

URL to open:  ftp://www.sco.com

These problems, except for pt_chmod, were reported to the Santa Cruz
Operation by the "[8LGM] Security Team", 8lgm@bagpuss.demon.co.uk. 


-------------------------- Here is the ftp.sco.com:/SSE/README file -----

Welcome to the System Security Enhancement (SSE) Area
----------------------------------------------------

The System Security Enhancement directory, (SSE), is here to 
provide timely fixes to problems with system security.  Binaries
acquired from this directory are to be considered preliminary fixes
only, and have not been fully tested or integrated.  As such, these
patches are not officially supported. They are provided as a timely 
response to security concerns that have been brought to the
attention of The Santa Cruz Operation. 

When final, approved patches are available, usually by a Support Level 
Supplement, the README files below will be modified to indicate the
existence of the finalized version of the supplement.

SCO reserves the right to change the contents of these supplements at any
time.

The format of the Supplements found here are as follows:


ssexxx.tar.Z                    - a compressed tar file 
ssexxx.ltr.Z                    - cover letter, release information,
                                  and installation instructions

where xxx indicates the number of the supplement.

Please note that the ssexxx.tar.Z files are *not* diskette images.

After downloading an SSE, uncompress both the tar file and the cover
letter.  For example, if you were trying to install SSE001, after
downloading sse001.tar.Z and ssexxx.ltr.Z, you would uncompress
both files:

# uncompress ssexxx.tar.Z
# uncompress ssexxx.ltr.Z

After uncompressing both files, you should then follow the instructions
provided in the sse001.ltr file for installation instructions.

These Supplements should be available in the following locations:

site            directory                       method
----            ---------                       ------
ftp.sco.COM:    /SSE                            Internet anonymous ftp
sosco:          /usr/spool/uucppublic/SSE       UUCP download, SOS
scolon:         /usr/spool/uucppublic/SSE       UUCP download, SOS



List of New System Security Enhancements (last updated 11/29/94)
----------------------------------------------------------------

New on 11/29/94:

sse001:  at(C) Enhancement

sse002:  login(M) Enhancement

sse003:  prwarn(C) Enhancement

see004:  sadc(ADM) Enhancement

sse005:  pt_chmod Enhancement

sse006:  passwd(C) Enhancement

CONNECTION INFORMATION
----------------------


For anonymous ftp connection:
-----------------------------

ftp to sosco.sco.com
Login name: ftp
Password:  your email address

ftp to ftp.sco.com
Login name: ftp
Password:  your email address

(Please note that the ftp server that is running on these machines expects your
Domain Name to be publically known to the net. Please contact
your internet provider for more information on registering your Domain
Name)      


ftp to ftp.uu.net  (NOTE: areas are located in the ./sco-archive directory)
Login name: ftp
Password: your email address



For anonymous UUCP connection:
------------------------------

For USA, Canada, Pacific Rim, Asia and Latin America customers:

Machine name:  sosco
Login name:  uusls  (fourth character is the letter "l")
No password

List of modems available for UUCP transfer from sosco.sco.com:

Standard V.32, (300-9600bps)     4@   408-425-3502
Hayes V Series 9600              2@   408-427-4470
Telebit Trailblazer                   408-429-1786


For Europe/Middle East/Africa customers there is a system located at
SCO EMEA (London):

Machine name:  scolon
Login name:  uusls
Password:  bbsuucp

List of modems available for UUCP transfer from scolon.sco.com:

Dowty Trailblazer  +44 (0)923 210911



For SCO Online Support (SOS) BBS download:
------------------------------------------

For those customers that have accounts on SOS these files can be
downloaded interactively via X, Y, Z MODEM or Kermit. Follow the
menus selections under "Toolchest" from the main SOS menu.

List of modems available for interactive transfer from sosco.sco.com:

First four are Standard V.32 (300-9600bps)      408-426-9495
Last three are Hayes 2400 compatible 

Telebit Trailblazer                             408-426-9525



For ftp via World Wide Web:
---------------------------

URL to open:  ftp://www.sco.com



------------------------------------------------------------------------------

List of available Security Enhancement (SSE) files:            

Numbers in parentheses are checksums of the files, generated using the "sum"
utility with the -r option.  Example: sum -r sse001.tar.Z      

NOTE:  These files are for downloading only. They CANNOT be obtained
       from SCO on diskette.

NOTE:  Please see the ".ltr" files for a list of SCO platforms that
       these Enhancements apply to. 


                 Size in bytes
File name       (checksum)      Description

sse001.ltr.Z      2254 (62340)  at(C) Enhancement  
sse001.tar.Z     28177 (01162)  

sse002.ltr.Z      2122 (64430)  login(M) Enhancement
sse002.tar.Z     60535 (24459)

sse003.ltr.Z      2190 (39557)  prwarn(C) Enhancement
sse003.tar.Z     20742 (53203)

sse004.ltr.Z      2491 (13484)  sadc(ADM) Enhancement
sse004.tar.Z     11936 (27375)

sse005.ltr.Z      1025 (25407)  pt_chmod Enhancement
sse005.tar.Z      2414 (06033)

sse006.ltr.Z       985 (36851)  passwd(C) Enhancement
sse006.tar.Z     86185 (19264)





=========================FORWARDED TEXT ENDS HERE=============================


CERT bulletins, CERT advisories, information about FIRST representatives, 
and other information related to computer security are available for 
anonymous FTP from info.cert.org.

If you wish to send sensitive incident or vulnerability information to
CERT staff by electronic mail, we strongly advise that the e-mail be
encrypted.  The CERT Coordination Center can support a shared DES key, PGP
(public key available via anonymous FTP on info.cert.org), or PEM (contact
CERT staff for details).

Internet E-mail: cert@cert.org
Telephone: 412-268-7090 (24-hour hotline)
           CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
           and are on call for emergencies during other hours.

CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
USA


*CERT is a service mark of Carnegie Mellon University.







 

Privacy Statement
Copyright 2008, SecurityFocus