[FUGSPBR] Fw: FreeBSD Security Advisory FreeBSD-SA-02:02.pw

Vitor de M. Carvalho vitor em softinfo.com.br
Sex Jan 4 23:33:09 BRST 2002



 Atenciosamente,
 Vitor de M. Carvalho
 System Network Administrator - Softinfo Network
 FreeBSD - The Power To Serve
 ICQ - 41747397


----- Original Message -----
From: "FreeBSD Security Advisories" <security-advisories em FreeBSD.ORG>
To: "FreeBSD Security Advisories" <security-advisories em FreeBSD.ORG>
Sent: Friday, January 04, 2002 11:04 PM
Subject: FreeBSD Security Advisory FreeBSD-SA-02:02.pw


> -----BEGIN PGP SIGNED MESSAGE-----
>
>
============================================================================
=
> FreeBSD-SA-02:02                                            Security
Advisory
>                                                                 FreeBSD,
Inc.
>
> Topic:          pw(8) race condition may allow disclosure of master.passwd
>
> Category:       core
> Module:         pw
> Announced:      2002-01-04
> Credits:        ryan beasley <ryanb em goddamnbastard.org>
> Affects:        All releases prior to 4.5-RELEASE,
>                 4.4-STABLE prior to the correction date
> Corrected:      2001-12-21 15:21:32 UTC (4.4-STABLE aka RELENG_4)
>                 2001-12-21 15:22:55 UTC (4.4-RELEASEp1 aka RELENG_4_4)
>                 2001-12-21 15:23:04 UTC (4.3-RELEASEp21 aka RELENG_4_3)
> FreeBSD only:   YES
>
> I.   Background
>
> The pw(8) utility is used to create, remove, modify, and display system
> users and groups.
>
> II.  Problem Description
>
> When creating, removing, or modifying system users, the pw utility
> modifies the system password file `/etc/master.passwd'.  This file
> contains the users' encrypted passwords and is normally only readable
> by root.  During the modification, a temporary copy of the file is
> created. However, this temporary file is mistakenly created with
> permissions that allow it to be read by any user.
>
> III. Impact
>
> A local attacker can read the temporary file created by pw(8) and
> use the encrypted passwords to conduct an off-line dictionary attack.
> A successful attack would result in the recovery of one or more
> passwords.  Because the temporary file is short-lived (it is removed
> almost immediately after creation), this can be difficult to exploit:
> an attacker must `race' to read the file before it is removed.
>
> IV.  Workaround
>
> 1) Do not use pw(8) to create, remove, or modify system users.
>
> V.   Solution
>
> One of the following:
>
> 1) Upgrade your vulnerable FreeBSD system to 4-STABLE (RELENG_4), the
> 4.4-RELEASE security-fix branch (RELENG_4_4), or the 4.3-RELEASE
> security-fix branch (RELENG_4_3), dated after the correction date.
>
> 2) FreeBSD 4.x systems prior to the correction date:
>
> The following patch has been verified to apply to FreeBSD 4.3-RELEASE,
> 4.4-RELEASE, and 4-STABLE dated prior to the correction date.  This
> patch may or may not apply to older, unsupported releases of FreeBSD.
>
> Download the patch and the detached PGP signature from the following
> locations, and verify the signature using your PGP utility.
>
> ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-02:02/pw.patch
> ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-02:02/pw.patch.asc
>
> Execute the following commands as root:
>
> # cd /usr/src
> # patch < /path/to/patch
> # cd /usr/src/usr.sbin/pw
> # make depend && make all install
>
> VI.  Correction details
>
> The following list contains the $FreeBSD$ revision numbers of each
> file that was corrected in the FreeBSD source
>
> Path                                                             Revision
>   Branch
> - ------------------------------------------------------------------------
-
> src/usr.sbin/pw/pwupd.c
>   HEAD (CURRENT)                                                     1.18
>   RELENG_4 (4-STABLE)                                            1.12.2.4
>   RELENG_4_4 (4.4-RELEASE security branch)                   1.12.2.3.4.1
>   RELENG_4_3 (4.3-RELEASE security branch)                   1.12.2.3.2.1
> - ------------------------------------------------------------------------
-
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.0.6 (FreeBSD)
> Comment: For info see http://www.gnupg.org
>
> iQCVAwUBPDZOB1UuHi5z0oilAQE/FQP/UjSXBA+ntiemKMpvgQfHkvNFjT/L9VC6
> j1q7yhuM+JKIeQcAiotvEFmnRjZquJaNTvBRa4TSbr9943smZ7w8wC3lzq4aLBSv
> e4L1F/uIUx19hyeEDL8FEdE5hqiltFJVa605pNoyLtLBQx9UfYkdfZo9SqFtAIdl
> qNU0wX2XJU0=
> =g2Uh
> -----END PGP SIGNATURE-----
>
> This is the moderated mailing list freebsd-announce.
> The list contains announcements of new FreeBSD capabilities,
> important events and project milestones.
> See also the FreeBSD Web pages at http://www.freebsd.org
>
>
> To Unsubscribe: send mail to majordomo em FreeBSD.org
> with "unsubscribe freebsd-announce" in the body of the message
>

----
Para sair da lista envie um e-mail para majordomo em fugspbr.org
com as palavras "unsubscribe fugspbr" no corpo da mensagem.



Mais detalhes sobre a lista de discussão freebsd