-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-97.08
Original issue date: February 20, 1997
Last revised: --
Topic: Vulnerability in innd
- -----------------------------------------------------------------------------
The CERT Coordination Center has received reports that a vulnerability exists
in all versions of INN (InterNetNews server) up to and including version 1.5.
This vulnerability allows unauthorized users to execute arbitrary commands on
the machine running INN by sending a maliciously formed news control message.
Because the problem is with the content of news control messages, attacks can
be launched remotely and may reach news servers located behind Internet
firewalls.
The CERT/CC recommends that sites upgrade to INN 1.5.1. Until you can do so,
we urge you to apply the patch described in Sec. III.B. Information about
this vulnerability has been widely distributed.
We will update this advisory as we receive additional information.
Please check advisory files regularly for updates that relate to your site.
- -----------------------------------------------------------------------------
I. Description
The INN daemon (innd) processes "newgroup" and "rmgroup" control messages
in a shell script (parsecontrol) that uses the shell's "eval" command.
However, some of the information passed to eval comes from the message
without adequate checks for characters that are special to the shell.
This permits anyone who can send messages to an INN server - almost
anyone with Usenet access - to execute arbitrary commands on that
server. These commands run with the uid and privileges of the "innd"
process on that server. Because such messages are usually passed through
Internet firewalls to a site's news server, servers behind such
firewalls are vulnerable to attack. Also, the program executes these
commands before checking whether the sender is authorized to create or
remove newsgroups, so checks at that level (such as running pgpverify)
do not prevent this problem.
All versions of INN through 1.5 are vulnerable. You can determine which
version of INN your site is running by connecting to the NNTP port
(119) of your news server. For example:
% telnet news.your.site 119
Connected to news.your.site
Escape character is '^]'.
200 news.your.site InterNetNews server INN 1.4unoff4 05-Mar-96 ready
Type "quit" to exit the connection. Note that this does not indicate
whether or not the patch recommended below has been installed.
II. Impact
Remote, unauthorized users can execute arbitrary commands on the
system with the same privileges as the innd (INN daemon) process.
III. Solution
Upgrade to INN 1.5.1. Until you can do so, install the patches available
from James Brister or get help from your vendor, if it is available.
A. Upgrade to INN 1.5.1
The current version of INN is 1.5.1, which does not have this
vulnerability. Archive sites for INN version 1.5.1 along with
additional information about INN are given at
http://www.isc.org/inn.html
The MD5 checksum for the gzip'ed tar file is
MD5 (inn-1.5.1.tar.gz) = 555d50c42ba08ece16c6cdfa392e0ca4
B. Install patches
Until you are able to upgrade to INN 1.5.1, we recommend installing
the following patches, which have been made available by James Brister,
the current maintainer of INN.
For releases inn1.4unoff3, inn1.4unoff4, and inn1.5 (all versions),
apply "security-patch.01" at
ftp://ftp.isc.org/isc/inn/patches/security-patch.01
MD5 (security-patch.01) = 06131a3d1f4cf19d7d1e664c10306fa8
For release 1.4sec, Brister recommends upgrading to a newer version,
but he has made the patch "security-patch.02" available at
ftp://ftp.isc.org/isc/inn/patches/security-patch.02
MD5 (security-patch.02) = 3a964ba0b2b2baf678ef554c67bb28f2
C. Consult your vendor
Below is a list of vendors who have provided information about this
problem. Details are in Appendix A of this advisory; we will update
the appendix as we receive more information. If your vendor's name is
not on this list, the CERT/CC did not hear from that vendor. Please
contact your vendor directly.
Berkeley Software Design, Inc. (BSDI)
Caldera
Cray Research - A Silicon Graphics Company
Debian Linux
Red Hat
...........................................................................
Appendix A - Vendor Information
Below is a list of the vendors who have provided information for this
advisory. We will update this appendix as we receive additional information.
If you do not see your vendor's name, the CERT/CC did not hear from that
vendor. Please contact the vendor directly.
Berkeley Software Design, Inc. (BSDI)
====================================
We ship INN as part of our distribution. BSD/OS 2.1 includes INN
1.4sec and 2.1 users should apply the patch referenced in the
advisory. BSD/OS 3.0 includes INN 1.4unoff4 and the patch for that
version is already included so BSD/OS 3.0 is not vulnerable as
distributed.
Caldera
=======
An upgrade package for Caldera OpenLinux Base 1.0 will appear at
Caldera's site:
ftp://ftp.caldera.com/pub/col-1.0/updates/Helsinki/004/inn-1.5.1-2.i386.rpm
MD5 sum is:
3bcd3120b93f41577d3246f3e9276098 inn-1.5.1-2.i386.rpm
Cray Research - A Silicon Graphics Company
==========================================
Cray Research has never shipped any news server with Unicos.
Debian Linux
============
The current version of INN shipped with Debian is 1.4unoff4. However
the "unstable" (or development) tree contains inn-1.5.1. It can be
gotten from any debian mirror in the subdirectory
debian/unstable/binary/news
d3603d9617fbf894a3743a330544b62e 591154 news optional inn_1.5.1-1_i386.deb
205850779d2820f03f2438d063e1dc51 45230 news optional inn-dev_1.5.1-1_i386.deb
badbe8431479427a4a4de8ebd6e1e150 31682 news optional inewsinn_1.5.1-1_i386.deb
Red Hat
=======
All users of Red Hat 4.0 and Red Hat 4.1 are urged to upgrade to the
inn-1.5.1-3 package available from ftp.redhat.com. The same package
will work on both 4.0 and 4.1 systems, and is available from
ftp.redhat.com in /updates/4.0 and /updates/4.1. Users with direct
Internet connections can upgrade with one of the following commands:
i386:
rpm -Uvh ftp://ftp.redhat.com/updates/4.1/i386/inn-1.5.1-3.i386.rpm
alpha (note the --ignorearch is only needed for Red Hat 4.0/AXP users):
rpm -Uvh --ignorearch \
ftp://ftp.redhat.com/4.1/updates/i386/inn-1.5.1-3.alpha.rpm
SPARC:
rpm -Uvh ftp://ftp.redhat.com/updates/4.1/sparc/inn-1.5.1-3.alpha.rpm
All of these packages have been signed with Red Hat's PGP key, which is
availble on all Red Hat CDROMs, ftp.redhat.com, and public keyservers.
- -----------------------------------------------------------------------------
The CERT Coordination Center thanks James Brister of the Internet Software
Consortium for making these fixes available and Matt Power of MIT for
analyzing and reporting this problem. We also thank AUSCERT for their
contributions to this advisory.
- -----------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident Response
and Security Teams (see ftp://info.cert.org/pub/FIRST/first-contacts).
CERT/CC Contact Information
- ----------------------------
Email [log in to unmask]
Phone +1 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30-5:00 p.m. EST(GMT-5) / EDT(GMT-4)
and are on call for emergencies during other hours.
Fax +1 412-268-6989
Postal address
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
USA
Using encryption
We strongly urge you to encrypt sensitive information sent by email. We can
support a shared DES key or PGP. Contact the CERT/CC for more information.
Location of CERT PGP key
ftp://info.cert.org/pub/CERT_PGP.key
Getting security information
CERT publications and other security information are available from
http://www.cert.org/
ftp://info.cert.org/pub/
CERT advisories and bulletins are also posted on the USENET newsgroup
comp.security.announce
To be added to our mailing list for advisories and bulletins, send
email to
[log in to unmask]
In the subject line, type
SUBSCRIBE your-email-address
- ---------------------------------------------------------------------------
Copyright 1997 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and the copyright statement is
included.
CERT is a service mark of Carnegie Mellon University.
- ---------------------------------------------------------------------------
This file: ftp://info.cert.org/pub/cert_advisories/CA-97.08.innd
http://www.cert.org
click on "CERT Advisories"
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMwykB3VP+x0t4w7BAQFLuAQApZshgfEySaH3v2t6j6lp81Sk3dPhUqg+
KFmiHK48pmpdjSdXm/IA1zYTMGUPF0NOB7hxm9QImrAuMYqjtfXwJyNtkSSgllnP
ruoJvxtNbKKsePZ5xUuToPSr23Es4GkfX56+I+WurOsuRL218ebUxGkMiQBge0Fs
INnynbgADKM=
=x4gR
-----END PGP SIGNATURE-----
|