Bugtraq mailing list archives
4 Advisories for Digital Unix: ftp, advs, rpc.statd, ftpd
From: delta () RUS UNI-STUTTGART DE (Helmut Springer)
Date: Fri, 8 May 1998 16:43:24 +0200
maybe someone should tell them to post here?
enjoy
delta
-----Start of forwarded message-----
______________________________________________________________
UPDATE: APR 30, 1998
TITLE: DIGITAL UNIX ftpd V3.2g, V4.0, V4.0a, V4.0b, V4.0c
Potential Security Vulnerability
Ref #: SSRT0505U
SOURCE: Digital Equipment Corporation
Software Security Response Team USA
"Digital is broadly distributing this Security Advisory in order
to bring to the attention of users of Digital's products the
important security information contained in this Advisory.
Digital recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Digital does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Digital will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
----------------------------------------------------------------------
IMPACT:
Digital has discovered a potential vulnerability with ftp
for DIGITAL UNIX software, where under certain circumstances, a user
may gain unauthorized file access.
Digital strongly recommends upgrading to a minimum of
Digital UNIX V4.0b accordingly, and that the appropriate
patch kit be installed immediately.
----------------------------------------------------------------------
RESOLUTION:
This potential security problem has been resolved in V4.0d and an official
patch for this problem has been made available as an early release
kit for DIGITAL UNIX V4.0a (duv40ass0000600039300-19980317.*)
and included in the latest DIGITAL UNIX V4.0b
aggregate DUPATCH Kit.
The V3.2g aggregate BL 10 patch kit #5
is scheduled for release in late June 1998.
The V4.0 aggregate BL 9 patch kit #6
is scheduled for release mid May 1998.
The V4.0c aggregate BL10 patch kit #6
is scheduled for release mid May 1998.
*This potential problem was included in the distributed release of
DIGITAL UNIX V4.0d
o the World Wide Web at the following FTP address:
http://www.service.digital.com/html/patch_service.html
Use the FTP access option, select DIGITAL_UNIX directory
then choose the appropriate version directory
and download the patch accordingly.
Note: [1]The appropriate patch kit must be installed
following any upgrade to V4.0a, V4.0b, or V4.0c
[2] Please review the appropriate release notes
prior to installation.
If you need further information, please contact your normal DIGITAL
support channel.
DIGITAL appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Digital urges you to periodically review your system
management and security procedures.
Digital will continue to review and enhance the security
features of its products and work with customers to maintain and
improve the security and integrity of their systems.
______________________________________________________________
Copyright (c) Digital Equipment Corporation, 1998 All
Rights Reserved.
Unpublished Rights Reserved Under The Copyright Laws Of
The United States.
______________________________________________________________
______________________________________________________________
UPDATE: APR 30, 1998
TITLE: DIGITAL UNIX softlinks - advfs V4.0, V4.0a, V4.0b,
V4.0c, V4.0d
- Potential Security Vulnerability
Ref#: SSRT0495U
SOURCE: Digital Equipment Corporation
Software Security Response Team
"Digital is broadly distributing this Security Advisory in order
to bring to the attention of users of Digital's products the
important security information contained in this Advisory.
Digital recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Digital does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Digital will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
----------------------------------------------------------------------
IMPACT:
Digital has discovered a potential vulnerability with the
Advanced File System Utility for DIGITAL UNIX
software, where under certain circumstances, an authorized
user may gain unauthorized privileges.
Digital strongly recommends upgrading to a minimum of
Digital UNIX V4.0b accordingly, and that the appropriate
patch kit be installed immediately.
----------------------------------------------------------------------
RESOLUTION:
This potential security problem has been resolved and an official
patch for this problem has been made available as an early release
kit for DIGITAL UNIX V4.0a (duv40ass0000600037800-19980317.*)
and included in the latest DIGITAL UNIX V4.0b and V4.0d
aggregate DUPATCH Kit.
The V4.0 aggregate BL 9 patch kit #6
is scheduled for release mid May 1998.
The V4.0c aggregate BL10 patch kit #6
is scheduled for release mid May 1998.
o the World Wide Web at the following FTP address:
http://www.service.digital.com/html/patch_service.html
Use the FTP access option, select DIGITAL_UNIX directory
then choose the appropriate version directory
and download the patch accordingly.
Note: [1]The appropriate patch kit must be installed
following any upgrade to V4.0a, V4.0b or V4.0d.
[2] Please review the appropriate release notes
prior to installation.
If you need further information, please contact your normal DIGITAL
support channel.
DIGITAL appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Digital urges you to periodically review your system
management and security procedures.
Digital will continue to review and enhance the security
features of its products and work with customers to maintain and
improve the security and integrity of their systems.
______________________________________________________________
Copyright (c) Digital Equipment Corporation, 1998 All
Rights Reserved.
Unpublished Rights Reserved Under The Copyright Laws Of
The United States.
______________________________________________________________
______________________________________________________________
UPDATE: APR 30, 1998
TITLE: DIGITAL UNIX rpc.statd V3.2g, V4.0, V4.0a, V4.0b,
V4.0c, V4.0d
- Potential Security Vulnerability
Ref: SSRT0456U
SOURCE: Digital Equipment Corporation
Software Security Response Team
"Digital is broadly distributing this Security Advisory in order
to bring to the attention of users of Digital's products the
important security information contained in this Advisory.
Digital recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Digital does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Digital will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
----------------------------------------------------------------------
IMPACT:
Digital has discovered a potential vulnerability with the
rpc for DIGITAL UNIX software, where under certain
circumstances, an user may gain unauthorized privileges.
Digital strongly recommends upgrading to a minimum of
Digital UNIX V4.0b accordingly, and that the appropriate
patch kit be installed immediately.
----------------------------------------------------------------------
RESOLUTION:
This potential security problem has been resolved and an official
patch for this problem has been made available as an early release
kit for DIGITAL UNIX V4.0a (duv40ass0000600039900-19980317.*)
and, included in the latest DIGITAL UNIX V4.0b and V4.0d
aggregate DUPATCH Kit.
The V3.2g aggregate BL 10 patch kit #5
is scheduled for release in late June 1998.
The V4.0 aggregate BL 9 patch kit #6
is scheduled for release mid May 1998.
The V4.0c aggregate BL10 patch kit #6
is scheduled for release mid May 1998.
o the World Wide Web at the following FTP address:
http://www.service.digital.com/html/patch_service.html
Use the FTP access option, select DIGITAL_UNIX directory
then choose the appropriate version directory
and download the patch accordingly.
Note: [1]The appropriate patch kit must be installed
following any upgrade to V4.0a, V4.0b or V4.0d.
[2] Please review the appropriate release notes
prior to installation.
If you need further information, please contact your normal DIGITAL
support channel.
DIGITAL appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Digital urges you to periodically review your system
management and security procedures.
Digital will continue to review and enhance the security
features of its products and work with customers to maintain and
improve the security and integrity of their systems.
__________________________________________________________________
Copyright (c) Digital Equipment Corporation, 1998 All
Rights Reserved.
Unpublished Rights Reserved Under The Copyright Laws Of
The United States.
__________________________________________________________________
______________________________________________________________
UPDATE: APR 30, 1998
TITLE: DIGITAL UNIX ftpd V3.2g, V4.0, V4.0a, V4.0b, V4.0c
- Potential Security Vulnerability
ref#: SSRT0452U ftpd (ftp bounce)
SOURCE: Digital Equipment Corporation
Software Security Response Team
"Digital is broadly distributing this Security Advisory in order
to bring to the attention of users of Digital's products the
important security information contained in this Advisory.
Digital recommends that all users determine the applicability of
this information to their individual situations and take
appropriate action.
Digital does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently,
Digital will not be responsible for any damages resulting from
user's use or disregard of the information provided in this
Advisory."
----------------------------------------------------------------------
IMPACT:
Digital has discovered a potential vulnerability with the
FTP (bounce) for DIGITAL UNIX software, where under certain
circumstances, an user may gain unauthorized privileges.
Digital strongly recommends upgrading to a minimum of
Digital UNIX V4.0b accordingly, and that the appropriate
patch kit be installed immediately.
----------------------------------------------------------------------
RESOLUTION:
This potential security problem has been resolved and an official
patch for this problem has been made available as an early release
kit for DIGITAL UNIX V4.0a (duv40ass0000600041100-19980317.*)
and, included in the latest DIGITAL UNIX V4.0b aggregate DUPATCH Kit.
The V3.2g aggregate BL 10 patch kit #5
is scheduled for release in late June 1998.
The V4.0 aggregate BL 9 patch kit #6
is scheduled for release mid May 1998.
The V4.0c aggregate BL10 patch kit #6
is scheduled for release mid May 1998.
*This potential problem was included in the distributed release of
DIGITAL UNIX V4.0d
o the World Wide Web at the following FTP address:
http://www.service.digital.com/html/patch_service.html
Use the FTP access option, select DIGITAL_UNIX directory
then choose the appropriate version directory
and download the patch accordingly.
Note: [1]The appropriate patch kit must be installed
following any upgrade to V4.0a, V4.0b, or V4.0c.
[2] Please review the appropriate release notes
prior to installation.
If you need further information, please contact your normal DIGITAL
support channel.
DIGITAL appreciates your cooperation and patience. We regret any
inconvenience applying this information may cause.
As always, Digital urges you to periodically review your system
management and security procedures.
Digital will continue to review and enhance the security
features of its products and work with customers to maintain and
improve the security and integrity of their systems.
______________________________________________________________
Copyright (c) Digital Equipment Corporation, 1998 All
Rights Reserved.
Unpublished Rights Reserved Under The Copyright Laws Of
The United States.
______________________________________________________________
-----End of forwarded message-----
--
helmut springer Consulting Unix, IP, Security, InfoServices
delta () RUS Uni-Stuttgart DE Stuttgart University, FRG
http://home.pages.de/~delta/
"Freedom's just another word for nothing left to lose" Kris Kristofferson
Current thread:
- Re: 3Com switches - undocumented access level., (continued)
- Re: 3Com switches - undocumented access level. Doug Hughes (May 06)
- Re: 3Com switches - undocumented access level. Durval Menezes (May 06)
- Re: 3Com switches - undocumented access level. Durval Menezes (May 06)
- Re: 3Com switches - undocumented access level. Jean-Francois Malouin (May 06)
- Re: 3Com switches - undocumented access level. Riku Meskanen (May 07)
- dip 3.3.7 exploit jamez (May 07)
- dip-3.3.7o exploit zef (May 07)
- Re: 3Com switches - undocumented access level. Eric Monti (May 07)
- Re: 3Com switches - undocumented access level. Sasha Egan (May 08)
- NSCA HTTPD (for Windows) bug. Renos (May 08)
- 4 Advisories for Digital Unix: ftp, advs, rpc.statd, ftpd Helmut Springer (May 08)
- xterm exploit [TOG issue] Andrea Arcangeli (May 08)
- BSDI 3.1/Squid Default Owner Jonathan A. Zdziarski (May 07)
- Re: 3Com switches - undocumented access level. Toh Chang Ying (May 08)
- Re: 3Com switches - undocumented access level. Aleph One (May 08)
- Re: 3Com switches - undocumented access level.) Riku Meskanen (May 09)
- Re: 3Com switches - undocumented access level.) Riku Meskanen (May 09)
- Re: 3Com switches - undocumented access level.) Joao Carlos Mendes Luis (May 10)
- Re: 3Com switches - undocumented access level.) Riku Meskanen (May 09)
- Re: 3Com switches - undocumented access level. der Mouse (May 08)
- Re: 3Com switches - undocumented access level. Sasha Egan (May 08)
- Re: 3Com switches - undocumented access level. Sasha Egan (May 08)
