Bugtraq mailing list archives

SGI Security Advisory 19961201-01-PX - Desktop searchbook Program


From: agent99 () boytoy csd sgi com (SGI Security Coordinator)
Date: Thu, 5 Dec 1996 15:39:05 -0800


DISTRIBUTION RESTRICTIONS:   NONE - FOR PUBLIC RELEASE



-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
                Silicon Graphics Inc. Security Advisory

        Title:   Permissions issue with IRIX 5.0.x, 5.1.x, 5.2, 5.3,
        Title:   6.0.x, 6.1 and 6.2 Desktop searchbook Program
        Number:  19961201-01-PX
        Date:    December 5, 1996
______________________________________________________________________________

Silicon Graphics provides this information freely to the SGI user community
for its consideration, interpretation, implementation and use.   Silicon
Graphics recommends that this information be acted upon as soon as possible.

Silicon Graphics  will  not  be  liable  for any  indirect, special, or
consequential damages arising from the use of, failure to use or improper
use of any of the instructions or information in this Security Advisory.
______________________________________________________________________________


Silicon Graphics Engineering and Worldwide Customer Service divisions
have become aware of a potential security issue in the IRIX 5.0.x, 5.1.x,
5.2, 5.3, 6.0.x, 6.1 and 6.2 /usr/sbin/searchbook program.

Silicon Graphics Inc. has investigated the issue and recommends the
following steps for neutralizing the exposure.  It is HIGHLY RECOMMENDED
that these measures be implemented on ALL SGI systems running IRIX versions
5.0.x, 5.1.x, 5.2, 5.3, 6.0.x, 6.1 and 6.2.  This issue will be corrected
in future releases of IRIX.



- --------------
- --- Impact ---
- --------------

The purpose of the /usr/sbin/searchbook program is to find desktop icons
locally and remotely.

A potential security issue can occur when using the /usr/sbin/searchbook
program resulting in incorrect permissions of 666 on the user files
<home dir>/.desktop-<hostname>/iconbook and
<home dir>/.desktop-<hostname>/searchbook.

A local account is required inorder to exploit this vulnerability both
locally and remotely.



- ----------------
- --- Solution ---
- ----------------


**** IRIX 4.x ****

This version of IRIX is not vulnerable as the /usr/sbin/searchbook
program is not part of this IRIX version.  No action is required.



**** IRIX 5.0.x and 5.1.x ****

There is no patch available for IRIX operating system versions 5.0.x
and 5.1.x.

It is possible to upgrade the system to IRIX 5.2 or higher and
then install the security patch for that version.   See the sections
below for IRIX 5.2 and higher for more information.



**** IRIX 5.2 ****

For the IRIX operating system version 5.2 an inst-able patch
has been generated and made available via anonymous FTP and your
service/support provider.  The patch is number 1595 and will install
only on IRIX 5.3.

The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
mirror, ftp.sgi.com.   Patch 1595 can be found in the following
directories on the FTP server:

        ~ftp/Security

                or

        ~ftp/Patches/5.2


                        ##### Checksums ####

The actual patch will be a tar file containing the following files:



Filename:                 README.patch.1595
Algorithm #1 (sum -r):    56778 8 README.patch.1595
Algorithm #2 (sum):       44694 8 README.patch.1595
MD5 checksum:             A751B85D3AA634CF99E69A569118B18F

Filename:                 patchSG0001595
Algorithm #1 (sum -r):    24771 1 patchSG0001595
Algorithm #2 (sum):       30476 1 patchSG0001595
MD5 checksum:             9D681D525186D3E4EBCED21E54F01066

Filename:                 patchSG0001595.desktop_eoe_sw
Algorithm #1 (sum -r):    60175 1351 patchSG0001595.desktop_eoe_sw
Algorithm #2 (sum):       38129 1351 patchSG0001595.desktop_eoe_sw
MD5 checksum:             A4541A1836059790ACADD137CB20B85E

Filename:                 patchSG0001595.idb
Algorithm #1 (sum -r):    43569 1 patchSG0001595.idb
Algorithm #2 (sum):       40960 1 patchSG0001595.idb
MD5 checksum:             FC1164D75BEC7F398CB4385C69E718FB



**** IRIX 5.3 ****

For the IRIX operating system version 5.3 an inst-able patch
has been generated and made available via anonymous FTP and your
service/support provider.  The patch is number 1596 and will install
on IRIX 5.3 and 6.1.

The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
mirror, ftp.sgi.com.   Patch 1596 can be found in the following
directories on the FTP server:

        ~ftp/Security

                or

        ~ftp/Patches/5.3


                        ##### Checksums ####

The actual patch will be a tar file containing the following files:



Filename:                 README.patch.1596
Algorithm #1 (sum -r):    42987 16 README.patch.1596
Algorithm #2 (sum):       48957 16 README.patch.1596
MD5 checksum:             EFAEEC6C85333C4D221A50276EEBB4A8

Filename:                 patchSG0001596
Algorithm #1 (sum -r):    56111 3 patchSG0001596
Algorithm #2 (sum):       11645 3 patchSG0001596
MD5 checksum:             083FC3CAD079B0EFC2A1A2E0A30B169D

Filename:                 patchSG0001596.desktop_eoe_sw
Algorithm #1 (sum -r):    52364 2053 patchSG0001596.desktop_eoe_sw
Algorithm #2 (sum):       27272 2053 patchSG0001596.desktop_eoe_sw
MD5 checksum:             EB254C57314237A4A7C5820E1A3EC47E

Filename:                 patchSG0001596.idb
Algorithm #1 (sum -r):    58313 3 patchSG0001596.idb
Algorithm #2 (sum):       24530 3 patchSG0001596.idb
MD5 checksum:             368863B59C807F0D9405773F1DD7CEBA



**** IRIX 6.0.x ****

IRIX operating system version 6.0.x was a limited release version.
For the IRIX operating system version 6.0.x an upgrade to 6.1 or
better is required first.  When the upgrade is completed, then
the security patches described in the following sections can be
applied depending on the final version of the upgrade.



**** IRIX 6.1 ****

For the IRIX operating system version 6.1 an inst-able patch
has been generated and made available via anonymous FTP and your
service/support provider.  The patch is number 1597 and will install
only on IRIX 6.1.

The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
mirror, ftp.sgi.com.   Patch 1597 can be found in the following
directories on the FTP server:

        ~ftp/Security

                or

        ~ftp/Patches/6.1


                        ##### Checksums ####

The actual patch will be a tar file containing the following files:



Filename:                 README.patch.1597
Algorithm #1 (sum -r):    48343 8 README.patch.1597
Algorithm #2 (sum):       44694 8 README.patch.1597
MD5 checksum:             53CCA0CE04D8A7EFF6630526141DA22C

Filename:                 patchSG0001597
Algorithm #1 (sum -r):    55114 1 patchSG0001597
Algorithm #2 (sum):       32664 1 patchSG0001597
MD5 checksum:             307723E41B743342F40E29C74C20A29C

Filename:                 patchSG0001597.desktop_eoe_sw
Algorithm #1 (sum -r):    15437 1673 patchSG0001597.desktop_eoe_sw
Algorithm #2 (sum):       49864 1673 patchSG0001597.desktop_eoe_sw
MD5 checksum:             26CAF64ACC9A95784295023C39D2E4C2

Filename:                 patchSG0001597.idb
Algorithm #1 (sum -r):    26214 1 patchSG0001597.idb
Algorithm #2 (sum):       41528 1 patchSG0001597.idb
MD5 checksum:             644091A8C63AA4EE45294F1FEF728BFD



**** IRIX 6.2 ****

For the IRIX operating system version 6.1 an inst-able patch
has been generated and made available via anonymous FTP and your
service/support provider.  The patch is number 1598 and will install
only on IRIX 6.1.

The SGI anonymous FTP site is sgigate.sgi.com (204.94.209.1) or its
mirror, ftp.sgi.com.   Patch 1598 can be found in the following
directories on the FTP server:

        ~ftp/Security

                or

        ~ftp/Patches/6.2



                        ##### Checksums ####

The actual patch will be a tar file containing the following files:



Filename:                 README.patch.1598
Algorithm #1 (sum -r):    52095 8 README.patch.1598
Algorithm #2 (sum):       44857 8 README.patch.1598
MD5 checksum:             4BA3F3FB34098C051DE7747065E0836A

Filename:                 patchSG0001598
Algorithm #1 (sum -r):    27329 1 patchSG0001598
Algorithm #2 (sum):       36873 1 patchSG0001598
MD5 checksum:             64C5D81CC8CE2ADDE9D2F1C42395E8B5

Filename:                 patchSG0001598.desktop_base_sw
Algorithm #1 (sum -r):    19453 1660 patchSG0001598.desktop_base_sw
Algorithm #2 (sum):       49283 1660 patchSG0001598.desktop_base_sw
MD5 checksum:             4D6D5AACA1C85B4BB8B7C2A257956550

Filename:                 patchSG0001598.idb
Algorithm #1 (sum -r):    26176 2 patchSG0001598.idb
Algorithm #2 (sum):       41957 2 patchSG0001598.idb
MD5 checksum:             BC6D9F1265EE6EE9BB53DF5E26C0F7EC



**** IRIX 6.3 ****

The IRIX operating system version 6.3 is not vulnerable to this issue.
No further action is requred.



- ------------------------
- --- Acknowledgments ---
- ------------------------

Silicon Graphics wishes to thank Hoss Firooznia for his assistance in
this matter.


- -----------------------------------------
- --- SGI Security Information/Contacts ---
- -----------------------------------------

If there are questions about this document, email can be sent to
cse-security-alert () csd sgi com.

                      ------oOo------

Silicon Graphics provides security information and patches for
use by the entire SGI community.  This information is freely
available to any person needing the information and is available
via anonymous FTP and the Web.

The primary SGI anonymous FTP site for security information and patches
is sgigate.sgi.com (204.94.209.1).  Security information and patches
are located under the directories ~ftp/security and ~ftp/patches,
respectively. The Silicon Graphics Security Headquarters Web page is
accessible at the URL http://www.sgi.com/Support/Secur/security.html.

For issues with the patches on the FTP sites, email can be sent to
cse-security-alert () csd sgi com.

For assistance obtaining or working with security patches, please
contact your SGI support provider.

                      ------oOo------

Silicon Graphics provides a free security mailing list service
called wiretap and encourages interested parties to self-subscribe
to receive (via email) all SGI Security Advisories when they are
released. Subscribing to the mailing list can be done via the Web
(http://www.sgi.com/Support/Secur/wiretap.html) or by sending email
to SGI as outlined below.

% mail wiretap-request () sgi com
subscribe wiretap <YourEmailAddress>
end
^d

In the example above, <YourEmailAddress> is the email address that you
wish the mailing list information sent to.  The word end must be on a
separate line to indicate the end of the body of the message. The
control-d (^d) is used to indicate to the mail program that you are
finished composing the mail message.


                      ------oOo------

Silicon Graphics provides a comprehensive customer World Wide Web site.
This site is located at http://www.sgi.com/Support/Secur/security.html.

                      ------oOo------

For reporting *NEW* SGI security issues, email can be sent to
security-alert () sgi com or contact your SGI support provider.  A
support contract is not required for submitting a security report.



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMqdc8rQ4cFApAP75AQGfjQP+JheEnDhsrmbbqae2qr8kAG5DPP0UioDT
mNDcJxuFWGjh94h9KavktAa3W4iUTjz1gVx0t7qAevbajT3VB58NwuOp3cEIAgR9
AFLU0RSv380OKMUwCNw5ZuGGQbgR9Yitj4xSwRRc+xQiM73KFvepHJDFP/xYjFcT
pS1JoF0jKeM=
=o4We
-----END PGP SIGNATURE-----



Current thread: