best-of-security mailing list (was: Solaris 2.5 Security Hole: local users can get root)

best-of-security mailing list (was: Solaris 2.5 Security Hole: local users can get root)

Post by Alan Coopersmi » Sat, 27 Jul 1996 04:00:00



[Followups set to comp.security.unix & misc since the b-o-s mailing list
 is not solaris/sun-specific but covers all UNIX'es and occasionally other
 platforms.]


|No, I won't send out the exploit script - CERT & Sun already have
|copies as does anyone who gets best-of-security mail.

Several people have asked me for more info about this mailing list -

a message body of "subscribe best-of-security".  The list's purpose is
to serve as "the one and only mailing list busy people need to read"
with readers culling the best & most important items from other mailing
lists & security information sources and sending them on to BOS.  (And
it actually operates somewhere near this - there are times when people
have to be reminded that this is *not* a discussion list or a place to
ask questions, but only a place to report information others need to
know.)

There is an archive of the list available at
        http://www.tryc.on.ca/hypermail/security/
but unfortunately it doesn't seem to have been updated recently.

--
_______________________________________________________________________

The Open Computing Facility at the University of California at Berkeley

 
 
 

1. Solaris 2.5 Security Hole: local users can get root

I'm sure you'll be seeing Sun Security Bulletins & CERT Advisories
on this before too long since an exploit script has been posted to
the best-of-security mailing list, but until then, it's probably a
very, very good idea to run the following command as root on any
Solaris 2.5.x systems you have:

        chmod 755 /usr/openwin/bin/kcms*

(Yes, I've tested the exploit script and within 5 minutes of playing
with it, I got a root shell from an unpriveledged account on our
patched-up-to-date Solaris 2.5 machine.  No, I won't send out the
exploit script - CERT & Sun already have copies as does anyone who
gets best-of-security mail.  And no, I don't know a bug number for
you to complain to sun about - I'm sure there will be one within a
day or two though.)

--
_______________________________________________________________________

The Open Computing Facility at the University of California at Berkeley

2. Mouses on Solaris X86

3. best-of-security mailing list. Gone ?

4. How to have Linux re-read all the configuration file without reboot?

5. security holes in nis+ for solaris 2.5

6. Next Kernel... 2.6 or 3.0?

7. Network Security Assessment/NT Security mailing lists

8. brain fart...

9. Security hole in exim 1.62: local root exploit

10. LOCAL/MAILING-LIST: Mailing list for Greek Linux Users

11. WWWWAIS 2.5 security holes / replacement for WWWWAIS?

12. Really serious security hole in Microport Unix (Re: SECURITY BUG IN INTERACTIVE UNIX SYSV386)