[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[IBM] Schwachstelle im IBM AIX pioinit Skript



-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgende Warnung des IBM Managed Security
Services. Wir geben diese Informationen unveraendert an Sie weiter.

Das pioinit Skript wird beim Hochfahren des Systems zum Initialisieren
des Druckservices ausgefuehrt.

  Schwachstelle im IBM AIX Skript pioinit

  Das pioinit Skript wird mit der Benutzer- und Gruppen-Id von 'bin'
  installiert. Ein lokaler Angreifer, der in der Gruppe bin ist, kann
  das Skript durch ein eigenes ersetzen und dadurch beim Hochfahren des
  Rechners beliebige Befehle mit root-Rechten ausfuehren.

Betroffen sind die folgenden Software Pakete und Plattformen:

  Skript pioinit
  Fileset printers.rte Version 5.2.0.75 ohne APAR IY79785
  Fileset printers.rte Version 5.3.0.30 ohne APAR IY79786

  IBM AIX 5.2, 5.3

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

Hersteller Advisory:
  http://www14.software.ibm.com/webapp/set2/subscriptions/ijhifoeblist?mode=1


(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,
		Klaus Moeller, DFN-CERT


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

IBM SECURITY ADVISORY

First Issued: Wed Jul 25 09:06:31 CDT 2007
===============================================================================
                           VULNERABILITY SUMMARY

VULNERABILITY:   AIX pioinit File Replacement Vulnerability

PLATFORMS:       AIX 5.2, 5.3

SOLUTION:        Apply the APAR, interim fix or workaround as described
                 below.

THREAT:          An attacker may execute aribtrary code with root privileges.

CERT VU Number:  n/a
CVE Number:      n/a
===============================================================================
                           DETAILED INFORMATION

I. OVERVIEW

    The pioinit script is run by root during platform boot to initialize the
    printer services.  This script is installed as user/group bin.

II. DESCRIPTION

    A local attacker in the bin group may execute arbitrary code with root
    privileges by installing their own copy of pioinit.  This is due to the
    default file permissions and a lack of checking within the inittab script
    for a valid copy of the pioinit script.

III. IMPACT

    A local attacker may run arbitrary code with root privileges.

IV. PLATFORM VULNERABILITY ASSESSMENT

    To determine if your system is vulnerable, run the following command:

    # lslpp -l | grep printers.rte

    The following filesets are vulnerable:

    AIX Level           Lower Level       Upper Level
    -------------------------------------------------
    5.2.0               5.2.0.75          5.2.0.75
    5.3.0               5.3.0.30          5.3.0.30

    NOTE: This vulnerability only pertains to AIX 5.2 TL08 and AIX 5.3 TL04.

V. SOLUTIONS

    A. APARS

        IBM provides the following fixes:

        AIX Level           APAR number       Availability
        --------------------------------------------------------------------
        5.2.0               IY79785           available
        5.3.0               IY79786           available

        AIX Version 5 APARs can be downloaded from:

        http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html

        NOTE: Affected customers are urged to upgrade to the latest applicable
        Technology Level and Service Pack.

    B. INTERIM FIXES

        Interim fixes are available.  The interim fix can be downloaded via
        ftp from:

        ftp://aix.software.ibm.com/aix/efixes/security/pioinit_ifix.tar.Z

        This is a compressed tarball containing this advisory, interim fix
        packages and PGP signatures for each package.  The interim fixes below
        include prerequisite checking. This will enforce the correct mapping
        between the fixes and AIX Technology Levels.

        AIX Release & Technology Level         Interim fix
        ---------------------------------------------------------------
        5200-08                                IY79785_08.070725.epkg.Z
        5300-04                                IY79786_04.070725.epkg.Z

        IMPORTANT: If possible, it is recommended that a mksysb backup of the
        system be created.  Verify it is both bootable and readable before
        proceeding.

        These interim fixes have not been fully regression tested; thus, IBM
        does not warrant the fully correct functionality of the interim fix.
        Customers install the interim fix and operate the modified version of
        AIX at their own risk.

        Verify you have retrieved the fixes intact:

        The interim fixes below are named by using the technology level
        corresponding to the release that the fix applies to. The checksums
        below were generated using the "sum" and "md5sum" commands and are as
        follows:

        Filename                   sum        md5sum
        ----------------------------------------------------------------------
        IY79785_08.070725.epkg.Z   18066 4    f94d2261b31269cafe4218632e056edf
        IY79786_04.070725.epkg.Z   54968 4    ae0ae8ac5b1e8ae07ec20667835a029c

        These sums should match exactly. The PGP signatures in the
        compressed tarball and on this advisory can also be used to verify
        the integrity of the various files they correspond to.  If the sums
        or signatures cannot be confirmed, double check the command results
        and the download site address.  If those are OK, contact IBM AIX
        Security at security-alert@xxxxxxxxxxxxxx and describe the
        discrepancy.

    C. INTERIM FIX INSTALLATION

        These packages use the new Interim Fix Management Solution to install
        and manage interim fixes.  More information can be found at:

        http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html

        To preview an epkg interim fix installation execute the following
        command:

        # emgr -e ipkg_name -p       # where ipkg_name is the name of the
                                     # interim fix package being previewed.

        To install an epkg interim fix package, execute the following command:

        # emgr -e ipkg_name -X       # where ipkg_name is the name of the
                                     # interim fix package being installed.

        The "X" flag will expand any filesystems if required.

VI. WORKAROUNDS

    None.

VII. OBTAINING FIXES

    AIX Version 5 APARs can be downloaded from:

        http://www.ibm.com/servers/eserver/support/unixservers/aixfixes.html

    Security related Interim Fixes can be downloaded from:

        ftp://aix.software.ibm.com/aix/efixes/security

VII. CONTACT INFORMATION

    If you would like to receive AIX Security Advisories via email, please
    visit:

        http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd

    Comments regarding the content of this announcement can be directed to:

        security-alert@xxxxxxxxxxxxxx

    To request the PGP public key that can be used to communicate
    securely with the AIX Security Team send email to
    security-alert@xxxxxxxxxxxxxx with a subject of "get key". The key
    can also be downloaded from a PGP Public Key Server. The key id is
    0x4265D862.

    Please contact your local IBM AIX support center for any assistance.

    eServer is a trademark of International Business Machines Corporation.
    IBM, AIX and pSeries are registered trademarks of International Business
    Machines Corporation.  All other trademarks are property of their
    respective holders.

VIII. ACKNOWLEDGMENTS

    This vulnerability was discovered internal to IBM as part of its
    commitment to secure the AIX operating system.

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (AIX)

iD8DBQFGqAl30eNzcEJl2GIRAh+mAKCyt9Jbld5nnvcY4RGAwcfWfxn9fQCfQPga
lXbA43jdlNjoFB24kmO4NcQ=
=3dDI
- -----END PGP SIGNATURE-----

- -- 
Dipl. Inform. Klaus Moeller (CSIRT)
DFN-CERT Services GmbH, https://www.dfn-cert.de, Phone +49 40 808077-555
Sitz / Register: Hamburg, AG Hamburg, HRB 88805, Ust-IdNr.: DE 232129737
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRqnzURYd1iQZmhQQAQEM7Qf/YEXfPsitX0MFCBCltlbeG6ydJ8sy/xZY
Bj6cNaRXx4WtbWf7tLr5+fFypUQhF5RBLLv0NapcT44eEF13hV38g+K0/FMNbQ7X
+r5pYRr/UMQ7NtUUakCf1jCDo5Og49HQhbthigk6E6k8FWei6UYDr/IJU63HaF3O
hrEyCzAMn2CCRTE33L4Yq7eEwM0avUokofLQZmTiKgac2ZTUVoFgUztwUVHvL9dk
cNcE9WoBLaZpiWbBT2X19gfeXjXCoZO0p42mMisXwniib8/CEijuIe5gMy7vpgaG
Nw+UNxWigiBq+7CM9IllAwb+ZwYsK8Lndu4IIuCdEHpMsQ6Y2wHhXg==
=Yrwl
-----END PGP SIGNATURE-----