Copy Link
Add to Bookmark
Report

CIAC B-19

  

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Vulnerability in UNIX System V on 386/486 Platforms

Critical UNIX System V on 386/486 Vulnerability Information
--------------------------------------------------------------------------
PROBLEM: UNIX System V security problem on 386/486 platforms (UAREA bug).
PLATFORM: UNIX System V for the Intel 80386/80486 based computers.
DAMAGE: Allows privileged access to files by non-privileged users.
SOLUTIONS: Patch/update available from various vendors.
IMPACT OF PATCH: Vulnerability eliminated. No other side-effects reported.
--------------------------------------------------------------------------
March 21, 1991, 1200 PST Number B-19

CIAC has learned of a vulnerability that allows privileged access to
files on some versions of UNIX System V running on an Intel
80386/80486 based computer. This problem known as the UAREA bug, has
been corrected by AT&T. Most vendors of UNIX System V based on the
AT&T software have recently released patches specifically designed for
their products. This bulletin provides a partial list of vendors that
are providing patches for this problem, as well as vendors whose
product never had the vulnerability in a specified release.

The following vulnerability matrix table lists each of vendor/version
combination for which CIAC has received information. For each vendor,
the listed versions were tested for this vulnerability, and a patch
was developed for those versions found to be vulnerable. If the
vendor/version combination does not exhibit the vulnerability,
"No" appears in the third column.

Vendor Version Exhibits vulnerability
------------------------ --------- ---------------------
Dell SVR3.2/1.0.6 Yes - patch available
Dell SVR3.2/1.1 No
Dell SVR4.0/2.0 No
Interactive 2.0.2 Yes - patch available
Interactive 2.2 Yes - patch available
Interactive 2.2.1 Yes - patch available
Everex (ESIX) Rev. D Yes - patch available
AT&T SVR3.2.0 Yes - patch available
AT&T SVR3.2.1 No
SCO all versions No
Microport 2.2 No

Most vendors are aware of this bug, and have taken steps to correct
the problem. If your vendor/version of UNIX is not listed, or is
listed as one of those that exhibits the vulnerability, you should
contact your UNIX System V vendor for the patch.


For additional information or assistance, please contact CIAC:

Hal Brand
(415) 422-6312 or (FTS) 532-6312

During working hours call CIAC at (415) 422-8193 or (FTS)
532-8193 or send e-mail to ciac@cheetah.llnl.gov.

Send FAX messages to: (415) 423-0913 or (FTS) 543-0913

This document was prepared as an account of work sponsored by an
agency of the United States Government. Neither the United States
Government nor the University of California nor any of their
employees, makes any warranty, express or implied, or assumes any
legal liability or responsibility for the accuracy, completeness, or
usefulness of any information, apparatus, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government or the University of California, and shall not be used for
advertising or product endorsement purposes.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT