[comp.os.vms] vms security patch

KVC@ENGVAX.SCG.HAC.COM (Kevin Carosso) (05/31/87)

Me and my big mouth...

When I sent a message out to the list indicating that the security patch
went in ok,  I also made the (possible) mistake of mentioning that I had
a test program that demo'd the problem.  Several (tons) of people have since
asked for a copy of the program, mainly to check their own sites vulnerability,
or they want to know the hole so they can see if their users have exploited
it.

I'm certain that the inquiries were based solely on the best of intentions,
but I cannot in good conscience distribute the thing.  I hope people will
understand that I don't wish to bear the responsibility of the program causing
someone a problem because it "fell into the wrong hands".

Most of the reasons and questions I got were:

- "I need to know if it's serious enough to warrant patching a
   production machine"

  The patch is simple and requires no down-time.  Simply reinstall the
  image.  The problem is serious enough to warrant you taking every effort
  to patch it.

- "How do I know if someone exploited it?  How do I tell if someone
   uses it in the future?"

  I will say only that it allows a nonprivileged user to modify SYSUAF.DAT.
  If things are strange in SYSUAF.DAT, maybe you got got.  Placing an alarm
  ACL on SYSUAF.DAT may help catch someone.  A skilled attacker, however,
  may have left no obvious traces so there are no quarantees.  It is very
  esoteric.  Not something you stumble upon.

- "How do I know if I need it?" "Is it big enough?"

  You need it if you are running VMS 4.4 or 4.5.  I do not know about
  4.5A, B, and C.  I suspect, but have no proof, that it is fixed in 4.6.
  You really do need it.

- "How do I get the patch?  Please send it to me!"

  DEC is making every effort to distribute the patch to all sites.
  When I called, the TSC informed me that a mandatory update was being sent
  to everyone who gets VMS updates.  I assume that includes those people who
  don't have TSC access, but still get VMS distributions.  If you really
  have no access to TSC contact your local DEC office.  I'm sure they
  will get it to you even if you don't have support.

  I have only given it to those I know personally.

Anyway, I hope everyone can understand my reasons for disappointing them.

        /Kevin Carosso            kvc@engvax.scg.hac.com
         Hughes Aircraft Co.      kvc%engvax@oberon.usc.edu

LEICHTER-JERRY@YALE.ARPA (05/31/87)

Just a brief expansion on what Kevin said:

    - "How do I know if I need it?" "Is it big enough?"
    
      You need it if you are running VMS 4.4 or 4.5.  I do not know about
      4.5A, B, and C.  I suspect, but have no proof, that it is fixed in 4.6.
      You really do need it.

You DO need it for 4.5A, B and C.  The same patchs WILL appear in 4.6.

The following is from memory, so the exact numbers may not be right:  The
patches are all to one file SYS$SHARE:SECURESHR.EXE, and set ECO levels 1
through 6.  ECO levels 1 and 2 were actually part of VMS 4.5; when the patch
is applied on a 4.5 system, VMSINSTAL will tell you about this (but proceed
to apply the other four patches anyway).  When it comes time to install 4.6,
VMSINSTAL will complain when it finds ECO's 3-6 already set, but again that's
no big deal.  In general, nothing terrible will happen if you these patches
are applied twice, so play it safe.

There's no reason NOT to apply this patch.  If you've received this patch
and haven't applied it, expect no sympathy from ANYONE if Joe Hacker then
proceeds to rob you blind.
							-- Jerry
-------

MANAGER@SMITH.BITNET (Mary Malmros) (06/01/87)

Kevin Carosso wrote that DEC is making every effort to distribute the patch to
all sites.  This was not my experience.  I called my DEC rep, explained the
situation, and asked for the patch.  She talked to someone else who said that
they were only distributing it to people who could prove that they could do the
hack or that the hack had been done to them. I'm ANNOYED.  I'm VERY VERY
ANNOYED.  My two machines are both on VMS 4.5 and I don't have the option to go
back, even if I were that crazy, because one is an 8500 and needs 4.4 for the
necessary drivers or what ever.  Furthermore, they're connected via DECnet to
about 22 machines at other sites in the area, all college/university sites with
God knows how many students who think that terrorizing systems managers is the
greatest new fun activity since someone discovered how to pull the wings off
flies.

Okay, flame off and sorry for the extraneous @^%#^$^!%#$%.  I would appreciate
it if anyone can help in the following ways:

1.  Does anyone else who is on software self-maintenance know of any
recourse other than DEC reps, when dealing with buggy software?

2.  Does anyone know when 4.6 will be out, and does anyone have any more
definite ideas about whether it will contain a fix?

3.  Failing in either of this, can anyone show me the hole so I can get the
patch?  I understand that no one wants to post it, but I will call you or
you can call me or I'll meet you somewhere and give you the secret password or
whatever.

PLEASE HELP.

Mary Malmros
Systems Manager
Center for Academic Computing
Stoddard Hall 24
Smith College
Northampton MA 01063
(413) 584-2700 x3073