6617923 2001-06-12 17:00 -0700  /75 rader/  <security@wirex.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-06-13  20:26  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: linuxlist@securityportal.com
Extern mottagare: immunix-announce@immunix.org
Mottagare: Bugtraq (import) <17402>
Ärende: xinetd update -- Immunix OS 7.0
------------------------------------------------------------
-----------------------------------------------------------------------
	Immunix OS Security Advisory

Packages updated:	xinetd
Affected products:	Immunix OS 7.0-beta and 7.0
Bugs fixed:		immunix/1614
Date:			Mon Jun 11 2001
Advisory ID:		IMNX-2001-70-024-01
Author:			Seth Arnold <sarnold@wirex.com>
-----------------------------------------------------------------------

Description:
  xinetd in the base Immunix OS 7.0 initially set its umask value to 0.
  This allows any services started via xinetd to create files that are
  world-writable unless the service changes its umask before creating
  files or specifies file modes when creating files. There is also a
  buffer overflow; StackGuard prevents this from being used to gain
  privileges, though an attacker could remotely kill the xinetd daemon.

  The default configuration of Immunix OS 7.0 has only wu-ftpd
  enabled; wu-ftpd appears to be careful when creating files to set
  the modes more restrictively, though we have not conducted an
  extensive audit.  Users who have enabled other services may be at
  higher risk. A service known to be vulnerable is Samba's SWAT tool.

  Immunix OS 6.2 used inetd rather than xinetd and is not vulnerable.

  Everyone is encouraged to upgrade xinetd; those who have enabled
  other services or used identd logging should upgrade xinetd quickly
  and examine their systems for world-writable files.

  References: http://www.securityfocus.com/archive/1/189621
  http://www.securityfocus.com/archive/1/188847

  Thanks to Andrew Tridgell and zen-parse for finding these problems.

Package names and locations:
  Precompiled binary packages for Immunix 7.0-beta and 7.0 are available at:
  http://download.immunix.org/ImmunixOS/7.0/updates/RPMS/xinetd-2.1.8.9pre15-2_imnx.i386.rpm

  Source package for Immunix 7.0-beta and 7.0 is available at:
  http://download.immunix.org/ImmunixOS/7.0/updates/SRPMS/xinetd-2.1.8.9pre15-2_imnx.src.rpm

md5sums of the packages:
  8841c6a1d15a063ca1bb16ba132e0f7d  RPMS/xinetd-2.1.8.9pre15-2_imnx.i386.rpm
  da497d94349ab3d1b2e0713be4595875  SRPMS/xinetd-2.1.8.9pre15-2_imnx.src.rpm


GPG verification:                                                               
  Our public key is available at <http://wirex.com/security/GPG_KEY>.           
  *** NOTE *** This key is different from the one used in advisories            
  IMNX-2001-70-020-01 and earlier.

Online version of all Immunix 6.2 updates and advisories:
  http://immunix.org/ImmunixOS/6.2/updates/

Online version of all Immunix 7.0-beta updates and advisories:
  http://immunix.org/ImmunixOS/7.0-beta/updates/

Online version of all Immunix 7.0 updates and advisories:
  http://immunix.org/ImmunixOS/7.0/updates/

NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

Contact information:
  To report vulnerabilities, please contact security@wirex.com. WireX 
  attempts to conform to the RFP vulnerability disclosure protocol
  <http://www.wiretrip.net/rfp/policy.html>.
(6617923) / <security@wirex.com>/---------(Ombruten)
Bilaga (application/pgp-signature) i text 6617924
6617924 2001-06-12 17:00 -0700  /10 rader/  <security@wirex.com>
Importerad: 2001-06-13  20:26  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: linuxlist@securityportal.com
Extern mottagare: immunix-announce@immunix.org
Mottagare: Bugtraq (import) <17403>
Bilaga (text/plain) till text 6617923
Ärende: Bilaga till: xinetd update -- Immunix OS 7.0
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjsmrSoACgkQVQcWL60UVMsw3ACcDA1gCwHjebDPB9xYQjNldoYQ
2PwAnRzFory41RVKWOe2gC+r6FvkqR28
=mbrJ
-----END PGP SIGNATURE-----
(6617924) / <security@wirex.com>/-------------------