Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Jul 2001 18:18:36 -0400 (EDT)
From:      Joe Oliveiro <joe@advancewebhosting.com>
To:        Jason DiCioccio <jdicioccio@epylon.com>
Cc:        "'Mike Tancsa'" <mike@sentex.net>, security@FreeBSD.ORG
Subject:   RE: FreeBSD Security Advisory FreeBSD-SA-01:
Message-ID:  <Pine.BSF.4.21.0107101818220.81390-100000@joe.pythonvideo.com>
In-Reply-To: <657B20E93E93D4118F9700D0B73CE3EA02FFEFA3@goofy.epylon.lan>

next in thread | previous in thread | raw e-mail | index | archive | help
but like it says, its only if you have untrusted users on your box.

On Tue, 10 Jul 2001, Jason DiCioccio wrote:

>  
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Yes, I just exploited it with the exploit posted to bugtraq, it is
> trivial.. the only way I have found to temporarily stop stupid script
> kiddies while I upgrade is:
> 
> touch /tmp/sh
> chmod 0 /tmp/sh
> 
> I'd upgrade real soon..
> 
> Cheers,
> - -JD-
> 
> - -----Original Message-----
> From: Mike Tancsa [mailto:mike@sentex.net]
> Sent: Tuesday, July 10, 2001 9:25 AM
> To: security@freebsd.org
> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-01:
> 
> 
> 
> Does anyone know if there are active exploits out there for this
> issue ? Is 
> it trivial / script kiddie friendly hole ?  Just trying to get a
> sense of 
> how urgent it is to upgrade.
> 
>          ---Mike
> 
> 
> At 07:02 AM 7/10/01 -0700, FreeBSD Security Advisories wrote:
> >-----BEGIN PGP SIGNED MESSAGE-----
> >
> >=====================================================================
> >======== FreeBSD-SA-01:42                                          
> >Security Advisory 
> >                                                                
> > FreeBSD, Inc. 
> >
> >Topic:          signal handling during exec may allow local root
> >                 compromise
> >
> >Category:       core
> >Module:         kernel
> >Announced:      2001-07-10
> >Credits:        Georgi Guninski <guninski@guninski.com>
> >Affects:        All released versions of FreeBSD 4.x,
> >                 FreeBSD 4.3-STABLE prior to the correction date.
> >Corrected:      2001-07-09
> >FreeBSD only:   Yes
> >
> >I.   Background
> >
> >When a process forks, it inherits the parent's signals.  When the
> >process execs, the kernel clears the signal handlers because they
> >are not valid in the new address space.
> >
> >II.  Problem Description
> >
> >A flaw exists in FreeBSD signal handler clearing that would allow
> >for some signal handlers to remain in effect after the exec.  Most
> >of the signals were cleared, but some signal hanlders were not. 
> >This allowed an attacker to execute arbitrary code in the context of
> >a setuid
> >binary.
> >
> >All versions of 4.x prior to the correction date including and
> >4.3-RELEASE are vulnerable to this problem.  The problem has been
> >corrected by copying the inherited signal handlers and resetting the
> >signals instead of sharing the signal handlers.
> >
> >III. Impact
> >
> >Local users may be able to gain increased privileges on the local
> >system.
> >
> >IV.  Workaround
> >
> >Do not allow untrusted users to gain access to the local system.
> >
> >V.   Solution
> >
> >One of the following:
> >
> >1) Upgrade your vulnerable FreeBSD system to 4.3-STABLE after the
> >correction date.
> >
> >2) To patch your present system: download the relevant patch from
> >the below location, and execute the following commands as root:
> >
> >[FreeBSD 4.1, 4.2, and 4.3 base systems]
> >
> >This patch has been verified to apply to FreeBSD 4.1, 4.2, and 4.3
> >only. It may or may not apply to older releases.
> >
> ># fetch 
> >ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.pa
> >tch # fetch 
> >ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.pa
> >tch.asc  
> >
> >Verify the detached PGP signature using your PGP utility.
> >
> ># cd /usr/src/sys/kern
> ># patch -p < /path/to/patch
> >
> >[ Recompile your kernel as described in
> >http://www.freebsd.org/handbook/kernelconfig.html and reboot the
> >system ]
> >
> >-----BEGIN PGP SIGNATURE-----
> >Version: GnuPG v1.0.6 (FreeBSD)
> >Comment: FreeBSD: The Power To Serve
> >
> >iQCVAwUBO0sBrlUuHi5z0oilAQF4nAP/Wi8RsYGjJQ7NgP/+FwMs8/lekAJ9iEan
> >3Ph7xpsFEhJFWhCfrhmM71fMnOwpZ5kijztSOEko7TMRzTtG+dZLKcCKmVg+a1dT
> >SJmm2SJp3NE1nlYVqSH1vfVeVcJI5rtAQ33gTPhiL5U26AMr4wep/Elv1p/Shb/D
> >CUpueXr6tEE=
> >=n74Z
> >-----END PGP SIGNATURE-----
> >
> >To Unsubscribe: send mail to majordomo@FreeBSD.org
> >with "unsubscribe freebsd-security" in the body of the message
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>;
> 
> iQA/AwUBO0swv1CmU62pemyaEQIRMwCgrtEr+ECiBqG3U2LVyiXr/4qG6d8AniiH
> Hg2QUoJx7soua+XBKajtExuV
> =Zw3k
> -----END PGP SIGNATURE-----
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0107101818220.81390-100000>