5161698 2000-06-05  04:13  /67 rader/ Postmaster
Mottagare: Bugtraq (import) <11153>
Ärende: Linux-Mandrake Xlockmore security update
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
User-Agent: Gnus/5.0807 (Gnus v5.8.7) Emacs/20.6
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Message-ID:  <m2hfb96xke.fsf@vador.mandrakesoft.com>
Date:         Sun, 4 Jun 2000 21:44:17 +0200
Reply-To: Chmouel Boudjnah <chmouel@MANDRAKESOFT.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Chmouel Boudjnah <chmouel@MANDRAKESOFT.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

-------------------------------------

   Linux-Mandrake Security Update

-------------------------------------

Package: xlockmore

Affected versions: 6.1, 7.0

Problem: Xlock is an X11 utility used to lock X-Window displays until
the password of the user running X is entered correctly. Of course, in
order to perform the password-check xlock must be setuid root and have
access to the shadowed passwd file. In the xlockmore distributions
versions prior to 4.16.1, a buffer overflow vulnerability was present
in xlock that permitted a user to view parts of the shadowed passwd
file. This is achieved by overwriting (with an oversized -mode
argument) a global variable storing a pointer to a string printed in
the "usage" output. The pointer would be overwritten with an address
pointing to the shadowed passwd data. With the long argument, xlock
would find and an error in the command syntax and exit, printing the
usage information (along with the shadowed passwd text).

Please upgrade to:

md5sum: 614600a41689677da12287b950c2708a
package: 6.1/RPMS/xlockmore-4.16.1-1mdk.i586.rpm

md5sum: d0a6a3bf840b4d3ea347892f8df1896e
source: 6.1/SRPMS/xlockmore-4.16.1-1mdk.src.rpm

md5sum: 82ea685b6c467a55fce37490286763ae
package: 7.0/RPMS/xlockmore-4.16.1-1mdk.i586.rpm

md5sum: d0a6a3bf840b4d3ea347892f8df1896e
source: 7.0/SRPMS/xlockmore-4.16.1-1mdk.src.rpm

To upgrade automatically, use « MandrakeUpdate ». If you want to
upgrade manually, download the updated package from one of our FTP
server mirrors and uprade with "rpm -Uvh package_name". All mirrors
are listed on http://www.mandrake.com/en/ftp.php3 Updated packages are
available in the "updates/" directory.

For example, if you are looking for an updated RPM package for
Mandrake 7.0, look for it in: updates/7.0/RPMS/

Note: we give the md5 sum for each package. It lets you check the
integrity of the downloaded package by running the md5sum command on
the package ("md5sum package.rpm").

--
MandrakeSoft Inc                http://www.mandrakesoft.com
                                                  --Chmouel
(5161698) ------------------------------------------

5166668 2000-06-06  09:37  /37 rader/ Postmaster
Mottagare: Bugtraq (import) <11163>
Ärende: Re: Linux-Mandrake Xlockmore security update
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID:  <20000605143914.DA698186AC@atlas.dgp.toronto.edu>
Date:         Mon, 5 Jun 2000 10:39:14 -0400
Reply-To: Alan J Rosenthal <flaps@DGP.TORONTO.EDU>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Alan J Rosenthal <flaps@DGP.TORONTO.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM

>Of course, in order to perform the password-check xlock must be setuid root
>and have access to the shadowed passwd file.

Well, no.  It needs read access to the shadow password file, and
that's it, and it doesn't need to be setuid root.

If you create a special "shadow gid" for use only by programs which
need only read access to /etc/shadow, and put /etc/shadow in group
shadow (still owned by root) and make it mode 640, then you can make
programs such as xlock(more) setgid shadow and thus give them no
other additional ability than to read /etc/shadow.

We might not want to get into hundreds of specialized groups for
special abilities to be granted to individual programs (although some
would surely argue that we should), but I think that anything big,
which includes anything which is an X client because the X libraries
are big, should not be setuid root if at all possible.

Some capabilities are equivalent to root.  "passwd" only needs to be
able to read *and*write* /etc/shadow, but there's no sense in using a
special group for this because the ability to write to /etc/shadow is
equivalent to root.

But the ability to *read* /etc/shadow is far short of compromising
root (it's simply the situation everyone was in before shadowed
passwords came about), and worth distinguishing from setuid root,
especially for X clients.

ajr
(5166668) ------------------------------------------(Ombruten)