[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

(fwd) Security Update: security problem in traceroute



[This message is for traceroute for Caldera, but most Linux
distributions are vulnerable.  Please upgrade if you have traceroute
installed on your system -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: aleph1@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 0.95.6us
Message-ID:  <20000929135349.A6881@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
Reply-To: Caldera Support Info <sup-info@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
X-To:         announce@xxxxxxxxxxxxxxxxxxxxxxxx, linux-security@xxxxxxxxxx,
              linuxlist@xxxxxxxxxxxxxxxxxx
From: Caldera Support Info <sup-info@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject:      Security Update: security problem in traceroute
Date:         Fri, 29 Sep 2000 13:53:49 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		security problem in traceroute
Advisory number: 	CSSA-2000-034.0
Issue date: 		2000 September, 29
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a bug in the traceroute command that can possibly be used
   by local users to obtain super user privilege.

   There are no exploits available so far, but we encourage our customers
   to upgrade nevertheless.

2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux Desktop 2.3        All packages previous to
   				traceroute-1.4a5-9

   OpenLinux eServer 2.3        All packages previous to
   and OpenLinux eBuilder       traceroute-1.4a5-9

   OpenLinux eDesktop 2.4	All packages previous to
                                traceroute-1.4a5-9

3. Solution

   Workaround:

   Remove the setuid bit from traceroute

        chmod u-s /usr/sbin/traceroute

   or uninstall it entirely:

        rpm -e traceroute

   The proper solution is to upgrade to the fixed packages.

4. OpenLinux Desktop 2.3

   4.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/SRPMS

   4.2 Verification

       10a0865014f9a7adde15b1273a613672  RPMS/traceroute-1.4a5-9.i386.rpm
       9bccc641518d1e2726b61911913006ba  SRPMS/traceroute-1.4a5-9.src.rpm

   4.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv traceroute-1.4a5-9.i386.rpm

5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0

   5.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/SRPMS

   5.2 Verification

       8f65446f8da688c94d7a1090579b987c  RPMS/traceroute-1.4a5-9.i386.rpm
       9bccc641518d1e2726b61911913006ba  SRPMS/traceroute-1.4a5-9.src.rpm

   5.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv traceroute-1.4a5-9.i386.rpm

6. OpenLinux eDesktop 2.4

   6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/

       The corresponding source code package can be found at:

       ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/SRPMS

   6.2 Verification

       45cd9ac95771a444ace0e2275789ba11  RPMS/traceroute-1.4a5-9.i386.rpm
       9bccc641518d1e2726b61911913006ba  SRPMS/traceroute-1.4a5-9.src.rpm

   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

	  rpm -Fhv traceroute-1.4a5-9.i386.rpm

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 7927.

8. Disclaimer

   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

9. Acknowledgements

  Thanks to Pekka Savola <pekkas@xxxxxxxxxx> for discovering the bug,
  and to Chris Evans <chris@xxxxxxxxxxxxxxxx>.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE51Jk118sy83A/qfwRAn/xAJ9jjBxGq7hmUC/wmJ4WnONm+5PcSwCfXdOK
F2BtVam2XeK9tCdUb9m68Mo=
=Xetc
-----END PGP SIGNATURE-----

------------------------------

End of this Digest
******************