[SECURITY-L] CAIS-Alerta: Vulnerabilidade no passwd do Solaris 8,9

CSIRT - UNICAMP security em unicamp.br
Ter Mar 9 10:50:36 -03 2004


----- Forwarded message from Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br> -----

From: Centro de Atendimento a Incidentes de Seguranca <cais em cais.rnp.br>
Subject: CAIS-Alerta: Vulnerabilidade no passwd do Solaris 8,9
To: rnp-alerta em cais.rnp.br, rnp-seg em cais.rnp.br
Date: Fri, 5 Mar 2004 15:06:50 -0300 (BRST)

-----BEGIN PGP SIGNED MESSAGE-----


Prezados,

O CAIS esta' repassando o alerta da Sun Microsystems, Sun(sm) Alert
Notification 57454: "Security Vulnerability Involving the passwd(1)
Command", que trata de uma vulnerabilidade no comando passwd que pode
permitir a um usuario local ganhar privilegios de administrador (root).


Sistemas afetados:

	. Solaris 8, plataformas X86 e Sparc
	. Solaris 9, plataformas X86 e Sparc


Correcoes disponiveis:

Recomenda-se fazer a atualizacao para as versoes disponiveis em:


. Solaris 8 Sparc
http://www.sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=108993&rev=32

. Solaris 9 Sparc
http://www.sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=113476&rev=11

. Solaris 8 X86
http://www.sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=108994&rev=32

. Solaris 9 X86
http://www.sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=114242&rev=07


Maiores informacoes:

. http://www.sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57454&zone_32=category%3Asecurity
. http://www.ciac.org/ciac/bulletins/o-088.shtml



O CAIS recomenda aos administradores manterem seus sistemas e aplicativos
sempre atualizados, de acordo com as ultimas versoes e correcoes
disponibilizadas pelos fabricantes.


Atenciosamente,


################################################################
#   CENTRO DE ATENDIMENTO A INCIDENTES DE SEGURANCA (CAIS)     #
#       Rede Nacional de Ensino e Pesquisa (RNP)               #
#                                                              #
# cais em cais.rnp.br       http://www.cais.rnp.br                #
# Tel. 019-37873300      Fax. 019-37873301                     #
# Chave PGP disponivel   http://www.rnp.br/cais/cais-pgp.key   #
################################################################

document id 	  	Synopsis 	  	Date
57454 	  	Security Vulnerability Involving the passwd(1) Command 26 Feb 2004

Description 	Top

Sun(sm) Alert Notification


          Sun Alert ID: 57454


          Synopsis: Security Vulnerability Involving the passwd(1) Command


          Category: Security


          Product: Solaris


          BugIDs: 4793719


          Avoidance: Patch


          State: Resolved


          Date Released: 26-Feb-2004


          Date Closed: 26-Feb-2004


          Date Modified:


        1. Impact

        A local unprivileged user may be able to gain unauthorized root
privileges due to a security issue involving the passwd(1) command.

        Sun acknowledges, with thanks, Tim Wort
(Tim.Wort em InklingResearch.com) for contacting us regarding this issue.

        2. Contributing Factors

        This issue can occur in the following releases:

        SPARC Platform


          Solaris 8 with patch 108993-14 through 108993-31 and without
patch 108993-32


          Solaris 9 without patch 113476-11


        x86 Platform


          Solaris 8 with patch 108994-14 through 108994-31 and without
patch 108994-32


          Solaris 9 without patch 114242-07


        Note: Solaris 7 is not affected by this issue.

        3. Symptoms

        There are no reliable symptoms that would show the described issue
has been exploited to gain unauthorized elevated privileges to a host.

Solution Summary 	Top

4. Relief/Workaround

        There is no workaround for this issue.

        5. Resolution

        This issue is addressed in the following releases:

        SPARC Platform


          Solaris 8 with patch 108993-32 or later


          Solaris 9 with patch 113476-11 or later


        x86 Platform


          Solaris 8 with patch 108994-32 or later


          Solaris 9 with patch 114242-07 or later


        This Sun Alert notification is being provided to you on an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may or
may not impact your system(s). Sun makes no representations, warranties,
or guarantees as to the information contained herein. ANY AND ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT,
ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN
SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE
TO USE THE INFORMATION CONTAINED HEREIN.  This Sun Alert notification
contains Sun proprietary and confidential information. It is being
provided to you pursuant to the provisions of your agreement to purchase
services from Sun, or, if you do not have such an agreement, the Sun.com
Terms of Use.

        This Sun Alert notification may only be used for the purposes
contemplated by these agreements.

        Copyright 2000-2004 Sun Microsystems, Inc., 4150 Network Circle,
Santa Clara, CA 95054 U.S.A. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBQEjBw+kli63F4U8VAQGM/gQAmH65NHX5WK4+VNU/uyEiJuwjS+cUp3xi
ij91jGPAyikWIgBAGCJn49ceWfKgF7NCc3s4h9HppyS3RY4/vSH67X9qsEJ8nHJ+
Ksr0AZx9WnknCzBCjKbbz1INukTZIfl7xZtfUnJRBSxMIQHRwaXi0ZIzYm7+qKkl
mwhia2sP1Gs=
=FUiS
-----END PGP SIGNATURE-----


----- End forwarded message -----



Mais detalhes sobre a lista de discussão SECURITY-L