I was made aware last night of a script being circulated which allows
one to gain a root shell on a workstation running SunOS 4.1.3.
The script takes as its argument the pid of a shell to be given root
access then the script builds a command which can be entered at the
eeprom prompt to change the effective user id of the shell to 0. The
script displays the command then gives detailed instructions on how to
get the eeprom prompt by using the L1-A keys and how to resume
processing after making the change.
My response was to enable command security-mode on all the workstations
in two labs of SUN workstations. This seems to have solved the exposure
problem.
I am posting this in case other people are as naive as I was in leaving
access to the eeprom commands on machines in a public access lab.
Also, I have a related question. I chose security-mode of command
rather than full because we still want to allow people to be able to
re-boot a workstation that has been left unattended with a screen lock
program running. It seems some of our students are not above leaving a
workstation locked while they go off to classes or whatever and this
denies access to the workstation to others. We were advising people to
sync the system to re-boot to reduce the chance of corrupting the
filesystems (the workstations have /, /usr and swap on the local disk.)
With command security-mode it seems they can no longer issue sync as
that appears to be in the restricted command set. What do other people
do to address problems such as these? Do you set security-mode to full
and require people to power cycle the machine to re-boot? Are there
other implications of the different security-mode settings that I may
not be aware of?
--
Computing Services UofNB Box 4400 (506) 453-3590 (FAX)
Fredericton, NB, CANADA, E3B 5A3 .......__/\o_.......