Debian: 'uucp' Unauthorized access vulnerability

    Date08 Feb 2002
    Posted ByLinuxSecurity Advisories
    Previous versions permit a local user to copy any file to anywhere which is writable bythe uucp uid, which effectively means that a local user can completelysubvert the UUCP subsystem, including stealing mail, etc.
    Debian Security Advisory DSA 079-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    February 8th, 2002
    Package        : uucp
    Vulnerability  : uucp uid/gid access
    Problem-Type   : local and remote
    Debian-specific: no
    Zenith Parsec discovered a security hole in Taylor UUCP 1.06.1.  It
    permits a local user to copy any file to anywhere which is writable by
    the uucp uid, which effectively means that a local user can completely
    subvert the UUCP subsystem, including stealing mail, etc.
    If a remote user with UUCP access is able to create files on the local
    system, and can successfully make certain guesses about the local
    directory structure layout, then the remote user can also subvert the
    UUCP system.  A default installation of UUCP will permit a remote user
    to create files on the local system if the UUCP public directory has
    been created with world write permissions.
    Obviously this security hole is serious for anybody who uses UUCP on a
    multi-user system with untrusted users, or anybody who uses UUCP and
    permits connections from untrusted remote systems.
    It was thought that this problem has been fixed with DSA 079-1, but
    that didn't fix all variations of the problem.  The problem is fixed
    in version 1.06.1-11potato2 of uucp which uses a patch from the
    upstream author Ian Lance Taylor.
    We recommend that you upgrade your uucp packages immediately.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 2.2 alias potato
      Source archives:
          MD5 checksum: 2c712e69b3b529f30153daf8b21e2bab
          MD5 checksum: 4f2b87605425e9d291efebb8428e5df4
          MD5 checksum: 390af5277915fcadbeee74d2f3038af9
      Alpha architecture:
          MD5 checksum: 802b9176a7d288f396483e02c70fe3e7
      ARM architecture:
          MD5 checksum: e3cc46ac6b268471b7a42c428a47bb64
      Intel ia32 architecture:
          MD5 checksum: 3cb57a9ad76d42dbc5d2559d585b39d1
      Motorola 680x0 architecture:
          MD5 checksum: 34ac6394a622f0e492288d9a33b0a67a
      PowerPC architecture:
          MD5 checksum: 7dd85581fcc2547df432060c2ca9afa9
      Sun Sparc architecture:
          MD5 checksum: f6460f4436d521140d15ee2c4d6dee17
      These files will probably be moved into the stable distribution on
      its next revision.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.