Bugtraq mailing list archives
SGI Security Advisory 19961201-01-PX - Desktop searchbook Program
From: agent99 () boytoy csd sgi com (SGI Security Coordinator)
Date: Thu, 5 Dec 1996 15:39:05 -0800
DISTRIBUTION RESTRICTIONS: NONE - FOR PUBLIC RELEASE -----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ Silicon Graphics Inc. Security Advisory Title: Permissions issue with IRIX 5.0.x, 5.1.x, 5.2, 5.3, Title: 6.0.x, 6.1 and 6.2 Desktop searchbook Program Number: 19961201-01-PX Date: December 5, 1996 ______________________________________________________________________________ Silicon Graphics provides this information freely to the SGI user community for its consideration, interpretation, implementation and use. Silicon Graphics recommends that this information be acted upon as soon as possible. Silicon Graphics will not be liable for any indirect, special, or consequential damages arising from the use of, failure to use or improper use of any of the instructions or information in this Security Advisory. ______________________________________________________________________________ Silicon Graphics Engineering and Worldwide Customer Service divisions have become aware of a potential security issue in the IRIX 5.0.x, 5.1.x, 5.2, 5.3, 6.0.x, 6.1 and 6.2 /usr/sbin/searchbook program. Silicon Graphics Inc. has investigated the issue and recommends the following steps for neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be implemented on ALL SGI systems running IRIX versions 5.0.x, 5.1.x, 5.2, 5.3, 6.0.x, 6.1 and 6.2. This issue will be corrected in future releases of IRIX. - -------------- - --- Impact --- - -------------- The purpose of the /usr/sbin/searchbook program is to find desktop icons locally and remotely. A potential security issue can occur when using the /usr/sbin/searchbook program resulting in incorrect permissions of 666 on the user files <home dir>/.desktop-<hostname>/iconbook and <home dir>/.desktop-<hostname>/searchbook. A local account is required inorder to exploit this vulnerability both locally and remotely. - ---------------- - --- Solution --- - ---------------- **** IRIX 4.x **** This version of IRIX is not vulnerable as the /usr/sbin/searchbook program is not part of this IRIX version. No action is required. **** IRIX 5.0.x and 5.1.x **** There is no patch available for IRIX operating system versions 5.0.x and 5.1.x. It is possible to upgrade the system to IRIX 5.2 or higher and then install the security patch for that version. See the sections below for IRIX 5.2 and higher for more information. **** IRIX 5.2 **** For the IRIX operating system version 5.2 an inst-able patch has been generated and made available via anonymous FTP and your service/support provider. The patch is number 1595 and will install only on IRIX 5.3. The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its mirror, ftp.sgi.com. Patch 1595 can be found in the following directories on the FTP server: ~ftp/Security or ~ftp/Patches/5.2 ##### Checksums #### The actual patch will be a tar file containing the following files: Filename: README.patch.1595 Algorithm #1 (sum -r): 56778 8 README.patch.1595 Algorithm #2 (sum): 44694 8 README.patch.1595 MD5 checksum: A751B85D3AA634CF99E69A569118B18F Filename: patchSG0001595 Algorithm #1 (sum -r): 24771 1 patchSG0001595 Algorithm #2 (sum): 30476 1 patchSG0001595 MD5 checksum: 9D681D525186D3E4EBCED21E54F01066 Filename: patchSG0001595.desktop_eoe_sw Algorithm #1 (sum -r): 60175 1351 patchSG0001595.desktop_eoe_sw Algorithm #2 (sum): 38129 1351 patchSG0001595.desktop_eoe_sw MD5 checksum: A4541A1836059790ACADD137CB20B85E Filename: patchSG0001595.idb Algorithm #1 (sum -r): 43569 1 patchSG0001595.idb Algorithm #2 (sum): 40960 1 patchSG0001595.idb MD5 checksum: FC1164D75BEC7F398CB4385C69E718FB **** IRIX 5.3 **** For the IRIX operating system version 5.3 an inst-able patch has been generated and made available via anonymous FTP and your service/support provider. The patch is number 1596 and will install on IRIX 5.3 and 6.1. The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its mirror, ftp.sgi.com. Patch 1596 can be found in the following directories on the FTP server: ~ftp/Security or ~ftp/Patches/5.3 ##### Checksums #### The actual patch will be a tar file containing the following files: Filename: README.patch.1596 Algorithm #1 (sum -r): 42987 16 README.patch.1596 Algorithm #2 (sum): 48957 16 README.patch.1596 MD5 checksum: EFAEEC6C85333C4D221A50276EEBB4A8 Filename: patchSG0001596 Algorithm #1 (sum -r): 56111 3 patchSG0001596 Algorithm #2 (sum): 11645 3 patchSG0001596 MD5 checksum: 083FC3CAD079B0EFC2A1A2E0A30B169D Filename: patchSG0001596.desktop_eoe_sw Algorithm #1 (sum -r): 52364 2053 patchSG0001596.desktop_eoe_sw Algorithm #2 (sum): 27272 2053 patchSG0001596.desktop_eoe_sw MD5 checksum: EB254C57314237A4A7C5820E1A3EC47E Filename: patchSG0001596.idb Algorithm #1 (sum -r): 58313 3 patchSG0001596.idb Algorithm #2 (sum): 24530 3 patchSG0001596.idb MD5 checksum: 368863B59C807F0D9405773F1DD7CEBA **** IRIX 6.0.x **** IRIX operating system version 6.0.x was a limited release version. For the IRIX operating system version 6.0.x an upgrade to 6.1 or better is required first. When the upgrade is completed, then the security patches described in the following sections can be applied depending on the final version of the upgrade. **** IRIX 6.1 **** For the IRIX operating system version 6.1 an inst-able patch has been generated and made available via anonymous FTP and your service/support provider. The patch is number 1597 and will install only on IRIX 6.1. The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its mirror, ftp.sgi.com. Patch 1597 can be found in the following directories on the FTP server: ~ftp/Security or ~ftp/Patches/6.1 ##### Checksums #### The actual patch will be a tar file containing the following files: Filename: README.patch.1597 Algorithm #1 (sum -r): 48343 8 README.patch.1597 Algorithm #2 (sum): 44694 8 README.patch.1597 MD5 checksum: 53CCA0CE04D8A7EFF6630526141DA22C Filename: patchSG0001597 Algorithm #1 (sum -r): 55114 1 patchSG0001597 Algorithm #2 (sum): 32664 1 patchSG0001597 MD5 checksum: 307723E41B743342F40E29C74C20A29C Filename: patchSG0001597.desktop_eoe_sw Algorithm #1 (sum -r): 15437 1673 patchSG0001597.desktop_eoe_sw Algorithm #2 (sum): 49864 1673 patchSG0001597.desktop_eoe_sw MD5 checksum: 26CAF64ACC9A95784295023C39D2E4C2 Filename: patchSG0001597.idb Algorithm #1 (sum -r): 26214 1 patchSG0001597.idb Algorithm #2 (sum): 41528 1 patchSG0001597.idb MD5 checksum: 644091A8C63AA4EE45294F1FEF728BFD **** IRIX 6.2 **** For the IRIX operating system version 6.1 an inst-able patch has been generated and made available via anonymous FTP and your service/support provider. The patch is number 1598 and will install only on IRIX 6.1. The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its mirror, ftp.sgi.com. Patch 1598 can be found in the following directories on the FTP server: ~ftp/Security or ~ftp/Patches/6.2 ##### Checksums #### The actual patch will be a tar file containing the following files: Filename: README.patch.1598 Algorithm #1 (sum -r): 52095 8 README.patch.1598 Algorithm #2 (sum): 44857 8 README.patch.1598 MD5 checksum: 4BA3F3FB34098C051DE7747065E0836A Filename: patchSG0001598 Algorithm #1 (sum -r): 27329 1 patchSG0001598 Algorithm #2 (sum): 36873 1 patchSG0001598 MD5 checksum: 64C5D81CC8CE2ADDE9D2F1C42395E8B5 Filename: patchSG0001598.desktop_base_sw Algorithm #1 (sum -r): 19453 1660 patchSG0001598.desktop_base_sw Algorithm #2 (sum): 49283 1660 patchSG0001598.desktop_base_sw MD5 checksum: 4D6D5AACA1C85B4BB8B7C2A257956550 Filename: patchSG0001598.idb Algorithm #1 (sum -r): 26176 2 patchSG0001598.idb Algorithm #2 (sum): 41957 2 patchSG0001598.idb MD5 checksum: BC6D9F1265EE6EE9BB53DF5E26C0F7EC **** IRIX 6.3 **** The IRIX operating system version 6.3 is not vulnerable to this issue. No further action is requred. - ------------------------ - --- Acknowledgments --- - ------------------------ Silicon Graphics wishes to thank Hoss Firooznia for his assistance in this matter. - ----------------------------------------- - --- SGI Security Information/Contacts --- - ----------------------------------------- If there are questions about this document, email can be sent to cse-security-alert () csd sgi com. ------oOo------ Silicon Graphics provides security information and patches for use by the entire SGI community. This information is freely available to any person needing the information and is available via anonymous FTP and the Web. The primary SGI anonymous FTP site for security information and patches is sgigate.sgi.com (204.94.209.1). Security information and patches are located under the directories ~ftp/security and ~ftp/patches, respectively. The Silicon Graphics Security Headquarters Web page is accessible at the URL http://www.sgi.com/Support/Secur/security.html. For issues with the patches on the FTP sites, email can be sent to cse-security-alert () csd sgi com. For assistance obtaining or working with security patches, please contact your SGI support provider. ------oOo------ Silicon Graphics provides a free security mailing list service called wiretap and encourages interested parties to self-subscribe to receive (via email) all SGI Security Advisories when they are released. Subscribing to the mailing list can be done via the Web (http://www.sgi.com/Support/Secur/wiretap.html) or by sending email to SGI as outlined below. % mail wiretap-request () sgi com subscribe wiretap <YourEmailAddress> end ^d In the example above, <YourEmailAddress> is the email address that you wish the mailing list information sent to. The word end must be on a separate line to indicate the end of the body of the message. The control-d (^d) is used to indicate to the mail program that you are finished composing the mail message. ------oOo------ Silicon Graphics provides a comprehensive customer World Wide Web site. This site is located at http://www.sgi.com/Support/Secur/security.html. ------oOo------ For reporting *NEW* SGI security issues, email can be sent to security-alert () sgi com or contact your SGI support provider. A support contract is not required for submitting a security report. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMqdc8rQ4cFApAP75AQGfjQP+JheEnDhsrmbbqae2qr8kAG5DPP0UioDT mNDcJxuFWGjh94h9KavktAa3W4iUTjz1gVx0t7qAevbajT3VB58NwuOp3cEIAgR9 AFLU0RSv380OKMUwCNw5ZuGGQbgR9Yitj4xSwRRc+xQiM73KFvepHJDFP/xYjFcT pS1JoF0jKeM= =o4We -----END PGP SIGNATURE-----
Current thread:
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Terrell Thacker (Dec 05)
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Paul B. Henson (Dec 05)
- SGI Security Advisory 19961201-01-PX - Desktop searchbook Program SGI Security Coordinator (Dec 05)
- suid_exec problem clarification Yuri Volobuev (Dec 05)
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Nikolai Matyushenko (Dec 06)
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Paul B. Henson (Dec 06)
- New INN security problems Chris Timmons (Dec 06)
- suid_exec Javier Romeu (Dec 06)
- <Possible follow-ups>
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Kevin L Prigge (Dec 05)
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Paul Ashton (Dec 06)
- Re: Solaris 2.x Vulnerability [/usr/vmsys/bin/chkperm] Casper Dik (Dec 06)