[comp.sys.att] Security problem on UNIX PC's

lenny@quincy.UUCP (09/23/87)

Security problem #1:

Under release 3.5 or more.  Send mail to yourself on 3B1, wait for the
<MAIL ENVELOPE> icon and then press either <MSG> or point to it with mouse and
press <B1>.  You immediately get thrown into mail, with your message displaying
and at the ? prompt type:  !sh   "Look ma, I'm root!"

Security problem #2:

A lot of people keep "tutor" with no password and widely distribute their
dialup number.  Tutor, a non-expert user, can't run the shell?! Or can they?
Create a file in the Filecabinet, editor either "vi" or "ed" and do a ":!sh"
in vi or "!sh" in ed, and wha-la!

Security problem #3:

Mail setup... UUCP phone numbers and passwords in the L.sys file are normally
protected so that NON-SUPERUSER people cannot hack them!  Go into mail setup
(any user... even Tutor) and you can get all the necessary hacking information!
Bad!!!!

Any others would be appreciated!!

					-Lenny

-- 
Lenny Tropiano               ...seismo!uunet!swlabs!godfre!quincy!lenny  -or-
American LP Systems, Inc.           ...cmcl2!phri!gor!helm!quincy!lenny  -or-
1777-18 Veterans Memorial Hwy.   	          ...mtune!quincy!lenny  -or
Islandia, New York 11722     +1 516-582-5525 ...ihnp4!icus!quincy!lenny

sean@killer.UUCP (09/24/87)

In article <54@quincy.UUCP>, lenny@quincy.UUCP (Lenny Tropiano) writes:
> Security problem #2:
> 
> A lot of people keep "tutor" with no password and widely distribute their
> dialup number.  Tutor, a non-expert user, can't run the shell?! Or can they?
> Create a file in the Filecabinet, editor either "vi" or "ed" and do a ":!sh"
> in vi or "!sh" in ed, and wha-la!
> 

	This one's easy:  assign tutor a password! :-)

	There is also another way for tutor to get a shell.  While in Office
of tutor the user has only to type /bin/sh or /bin/ksh, and the User Agent will
run the shell.  This works for ANY user not having "EXPERT" status.  The pass-
word solution will keep unwanted folks from getting in as tutor, but I dunno
how one would prevent this security problem once tutor has logged in success-
fully.

> Security problem #3:
> 
> Mail setup... UUCP phone numbers and passwords in the L.sys file are normally
> protected so that NON-SUPERUSER people cannot hack them!  Go into mail setup
> (any user...even Tutor) and you can get all the necessary hacking information!

	My solution here was to edit /usr/lib/ua/Administration.  Remove any
entries from this file that you don't want everyone using, and put them in
the install login's personal Administration file (/u/install/Administration).
In fact, the only things I left in /usr/lib/ua/Administration are "Changing
Password" and "System Information"; I moved the rest to install's Administra-
tion.  As an extra measure of security on L.sys (or Systems, as the case may
be) I set the permissions to 640.  If you do this you'll have to change the
file's group to mail, so that the AT&T Electronic Mail software can read it.

							Sean

dpw@unisec.usi.com (Darryl P. Wagoner) (09/26/87)

Yes, indeed these are problems.  The mail hole can be fixed by my
email program that I posted a month or so ago.  It solves the problem
by setting the user's id before it execs elm or mailx.

If anyone would like a copy, drop me a line and I will mail it to you.

I am going to offer ideas on other holes and solutions without
spelling out how to expoit them.  Please don't followup and try to show
how bright you are by telling the world how to breakin with these hole.

As I pointed out before the fire sale, the Unix PC has a few other 
security problems.  Namely:

	/usr/lib/ua/uasetx and /usr/lib/ua/uasig

one of these or maybe both can used for priviaged command from the
UA.   You can put a "EXEC -w -p $SHELL for your Unix System in your 
office and get a root shell.   The only way to prevent this is to make
a "super" group of those people that you trust and change mode of
these commands to 4710 mode.

Next, it seems that on 3.51 "/" is 777 mode.  I will not point out
the problem with that but you should fix it.

Also, a generic System V hole.  Don't use a .profile to startup
a captive program such as a BBS or info about the system and how
to get a account.  These types of programs should be the default
shell and must be compiled program (not scripts).
-- 
Darryl Wagoner		dpw@unisec.usi.com
UniSecure Systems, Inc.; 			OS/2, No Unix!
Newport,  RI; (401)-849-0857 
UUCP:  {gatech|cbosgd|uiucdcs|ihnp4}!rayssd!unisec!dpw

gwyn@brl-smoke.ARPA (Doug Gwyn ) (09/27/87)

In article <54@quincy.UUCP> lenny@quincy.UUCP (Lenny Tropiano) writes:
>Security problem #1:
>Security problem #2:
>Security problem #3:

The moral is, "privileges" (set-UIDness) should be given only to small,
isolated processes that carefully perform simple tasks, NOT to fancy
interactive interfaces.

Second moral:  It's hard to provide a guaranteed controlled environment
that is also featureful.  Chroot can help with this, but by the time
sufficient useful facilities are placed into the new environment, it's
not much safer than an uncontrolled environment.

daveb@geac.UUCP (Brown) (09/27/87)

In article <6478@brl-smoke.ARPA> gwyn@brl.arpa (Doug Gwyn (VLD/VMB) <gwyn>) writes:
>Second moral:  It's hard to provide a guaranteed controlled environment
>that is also featureful.  Chroot can help with this, but by the time
>sufficient useful facilities are placed into the new environment, it's
>not much safer than an uncontrolled environment.

  This has been dealt with to a limited degree in the second version
of "Secure Xenix[1]".  The trusted shell[2] is a table-driven command
interpreter with a facility to set the "role" of the user, which
serves to set the tables that she can use. Ie, if I'm the auditor and
the filesystem maintainer, I can issue both filesystem and auditing commands.
  This is know as an "open subsystem", and was first popularized by
ICL (you know, the english mainframers).  It is the opposite of a
"closed subsystem" like mail or <your favorite editor>.

 --dave

1. Xenix is a Trademark of Microsoft.
2. Hecht et all, "UNIX without the Superuser", in "Conference
   Proceedings of the Summer 1987 USENIX Technical Conference and
   Exposition".
-- 
 David Collier-Brown.                 {mnetor|yetti|utgpu}!geac!daveb
 Geac Computers International Inc.,   |  Computer Science loses its
 350 Steelcase Road,Markham, Ontario, |  memory (if not its mind)
 CANADA, L3R 1B3 (416) 475-0525 x3279 |  every 6 months.

mike@turing.unm.edu.unm.edu (Michael I. Bushnell) (10/12/87)

In article <1487@geac.UUCP> daveb@geac.UUCP (Dave Collier-Brown) writes:
>.....
>  This is know as an "open subsystem", and was first popularized by
>ICL (you know, the english mainframers).  It is the opposite of a
>"closed subsystem" like mail or <your favorite editor>.

Nope.  <my favorite editor> is GNU emacs.  It isn't a closed
subsystem, rather, it allows E-Lisp to execute any command.

.
.
.

Sigh.




					Michael I. Bushnell
					a/k/a Bach II
					mike@turing.unm.edu
					{ucbvax,gatech}!unmvax!turing!mike
---
Tex SEX!  The HOME of WHEELS!  The dripping of COFFEE!!  Take me
 to Minnesota but don't EMBARRASS me!!
				-- Zippy the Pinhead