Copy Link
Add to Bookmark
Report

CERT Advisory 145

eZine's profile picture
Published in 
CERT Advisory
 · 28 Dec 2019

  


-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
CERT* Advisory CA-97.13
Original issue date: May 7, 1997
Last revised: June 4, 1997
Appendix A - updated vendor information for BSDI.

A complete revision history is at the end of this file.

Topic: Vulnerability in xlock
- -----------------------------------------------------------------------------

The CERT Coordination Center has received reports that a buffer overflow
condition exists in some implementations of xlock. This vulnerability makes it
possible for local users (users with access to an account on the system) to
execute arbitrary programs as a privileged user.

Exploitation information involving this vulnerability has been made publicly
available.

If your system is vulnerable, the CERT/CC team recommends installing a
patch from your vendor. If you are not certain whether your system is
vulnerable or if you know that your system is vulnerable and you cannot add a
patch immediately, we urge you to apply the workaround described in
Section III.B.

We will update this advisory as we receive additional information.
Please check our advisory files regularly for updates that relate to your site.

- -----------------------------------------------------------------------------

I. Description

xlock is a program that allows a user to "lock" an X terminal. A buffer
overflow condition exists in some implementations of xlock. It is
possible attain unauthorized access to a system by engineering a
particular environment and calling a vulnerable version of xlock that has
setuid or setgid bits set. Information about vulnerable versions must be
obtained from vendors. Some vendor information can be found in Appendix A
of this advisory.

Exploitation information involving this vulnerability has been made
publicly available.

Note that this problem is different from that discussed in CERT Advisory
CA-97.11.libXt.


II. Impact

Local users are able to execute arbitrary programs as a privileged user
without authorization.


III. Solution

Install a patch from your vendor as described in Solution A. If you are
not certain whether your system is vulnerable or if you know that your
system is vulnerable and you cannot install a patch immediately, we
recommend Solution B.

A. Obtain and install a patch for this problem.

Below is a list of vendors who have provided information about
xlock. Details are in Appendix A of this advisory; we will
update the appendix as we receive more information. If your
vendor's name is not on this list, the CERT/CC did not hear from
that vendor. Please contact your vendor directly.

Berkeley Software Design, Inc. (BSDI)
Cray Research - A Silicon Graphics Company
Data General Corporation
Digital Equipment Corporation
FreeBSD, Inc.
Hewlett-Packard Company
IBM Corporation
LINUX
NEC Corporation
The Open Group [This group distributes the publicly available software
that was formerly distributed by X Consortium]
Solbourne
Sun Microsystems, Inc.


B. We recommend the following workaround if you are not certain
whether your system is vulnerable or if you know that your system
is vulnerable and you cannot install a patch immediately.

1. Find and disable any copies of xlock that exist on your system and
that have the setuid or setgid bits set.

2. Install a version of xlock known to be immune to this
vulnerablility. One such supported tool is xlockmore. The latest
version of this tool is 4.02, and you should ensure that this is
the version you are using. This utility can be obtained from the
following site:

ftp://ftp.x.org/contrib/applications/xlockmore-4.02.tar.gz
MD5 (xlockmore-4.02.tar.gz) = c158e6b4b99b3cff4b52b39219dbfe0e

You can also obtain this version from mirror sites. A list of
these sites will be displayed if you are not able to access the
above archive due to load.

...........................................................................

Appendix A - Vendor Information

Below is a list of the vendors who have provided information for this
advisory. We will update this appendix as we receive additional information.
If you do not see your vendor's name, the CERT/CC did not hear from that
vendor. Please contact the vendor directly.

Berkeley Software Design, Inc. (BSDI)
=====================================

BSD/OS 2.1 is vulnerable to the xlock vulnerability. BSDI recommends that 2.1
customers either upgrade to BSD/OS 3.0 or remove the setuid permission from
/usr/X11/bin/xlock.


Cray Research - A Silicon Graphics Company
==========================================
Cray Research does not include xlock in its X Window releases, so we are
not at risk on the xlock buffer overflow problem.


Data General Corporation
========================
The xlock sources (xlockmore-3.7) that DG includes in its contributed
software package have been modified to remove this vulnerability. These
will be available when release 8 comes out. We also recommend that our
customers who have the current version should change the sprintf calls in
resource.c to snprintf calls, rebuild and reinstall the package.


Digital Equipment Corporation
=============================
This reported problem is not present for Digital's ULTRIX or
Digital UNIX Operating Systems Software.


FreeBSD, Inc.
=============
The xlockmore version we ship in our ports collection is vulnerable
in all shipped releases. The port in FreeBSD-current is fixed.
Solution is to install the latest xlockmore version (4.02).


Hewlett-Packard Company
=======================
We ship an suid root program vuelock that is based on xlock.
It does have the vulnerability.

The only workaround is to remove the executable, the patch is "in process".


IBM Corporation
===============
AIX is vulnerable to the conditions described in this advisory.
The following APARs will be released soon:

AIX 3.2: APAR IX68189
AIX 4.1: APAR IX68190
AIX 4.2: APAR IX68191

IBM and AIX are registered trademarks of International Business Machines
Corporation.


LINUX
=====
Red Hat:
Not vulnerable

Caldera:
Not vulnerable

Debian:
An updated package is on the Debian site

SuSE:
ftp://ftp.suse.com/pub/SuSE-Linux/suse_update/S.u.S.E.-4.4.1/xap1/xlock

And in general the new Xlockmore release fixes the problems.


NEC Corporation
===============
UX/4800 Not vulnerable for all versions.
EWS-UX/V(Rel4.2MP) Not vulnerable for all versions.
EWS-UX/V(Rel4.2) Not vulnerable for all versions.
UP-UX/V(Rel4.2MP) Not vulnerable for all versions.


The Open Group
==============
Publicly available software that was formerly distributed by the X Consortium -

Not vulnerable.


Solbourne
=========
Solbourne is not vulnerable to this attack.


Sun Microsystems, Inc.
======================
We are producing patches for OpenWindows 3.0 for Sun OS versions
4.1.3_U1, 4.1.4, 5.3, 5.4, 5.5, and 5.5.1.



- -----------------------------------------------------------------------------
The CERT Coordination Center thanks David Hedley for reporting the original
problem and Kaleb Keithley at The Open Group for his support in the
development of this advisory.
- -----------------------------------------------------------------------------

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see http://www.first.org/team-info/).


CERT/CC Contact Information
- ----------------------------
Email cert@cert.org

Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.

Fax +1 412-268-6989

Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA

Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key

Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/

CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce

To be added to our mailing list for advisories and bulletins, send
email to
cert-advisory-request@cert.org
In the subject line, type
SUBSCRIBE your-email-address

- ---------------------------------------------------------------------------
* Registered U.S. Patent and Trademark Office.

Copyright 1997 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.

The CERT Coordination Center is part of the Software Engineering Institute
(SEI). The SEI is sponsored by the U.S. Department of Defense.
- ---------------------------------------------------------------------------

This file: ftp://info.cert.org/pub/cert_advisories/CA-97.13.xlock
http://www.cert.org
click on "CERT Advisories"


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history

June 4, 1997 Appendix A - updated vendor information for BSDI.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBM5WRfnVP+x0t4w7BAQECtgP/c9ppI+G2pjiQ5pgPMLqqmhW06qAX7bNC
/qxRHLeYrJW2vooGqgBFBB4rzkmshgzPWoIYXF10KJragRhxxqAhtMUV4VnrkYec
Wz/iI2qY99rKRhC6C+hFM+6rrvkBU8keV/bo3bMCh1oYWQ2uL+0SWddq774a9iOy
IWn+SPYPc/s=
=X42j
-----END PGP SIGNATURE-----

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT