Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2002-137: util


Vulnerability Assessment Details

RHSA-2002-137: util

Vulnerability Assessment Summary
Check for the version of the util packages

Detailed Explanation for this Vulnerability Assessment


The util-linux package shipped with Red Hat Linux Advanced Server contains
a locally exploitable vulnerability.

The util-linux package contains a large variety of low-level system
utilities that are necessary for a Linux system to function. The 'chfn'
utility included in this package permits users to modify personal
information stored in the system-wide password file, /etc/passwd. In order
to modify this file, this application is installed setuid root.

Under certain conditions, a carefully crafted attack sequence can be
performed to exploit a complex file locking and modification race present
in this utility permiting changes to be made to /etc/passwd.

In order to successfully exploit the vulnerability and perform privilege
escalation there is a need for a minimal administrator interaction.
Additionally, the password file must be over 4 kilobytes, and the local
attackers entry must not be in the last 4 kilobytes of the password file.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2002-0638 to this issue.

An interim workaround is to remove setuid flags from /usr/bin/chfn and
/usr/bin/chsh. All users of Red Hat Linux should update to the errata
util-linux packages which contain a patch to correct this vulnerability.

Many thanks to Michal Zalewski of Bindview for alerting us to this issue.




Solution : http://rhn.redhat.com/errata/RHSA-2002-137.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

HP PROLIANT MICROSERVER G8 CORE I3-3240 3.4GHZ 4GB 2 X 1TB MIDLINE
$839.0
HP PROLIANT MICROSERVER G8 CORE I3-3240 3.4GHZ 4GB 2 X 1TB MIDLINE pictureHP PROLIANT MICROSERVER G8 CORE I3-3240 3.4GHZ 4GB 4 X 1TB MIDLINE
$1139.0
HP PROLIANT MICROSERVER G8 CORE I3-3240 3.4GHZ 4GB 4 X 1TB MIDLINE pictureXYRATEX 92883-01 92939-02 63011-02 IBM / SUPER MICRO SERVER BACK PLANE
$139.99
XYRATEX 92883-01 92939-02 63011-02 IBM / SUPER MICRO SERVER BACK PLANE pictureHP GG795AA MediaSmart Server Micro Tower EX470
$29.95
HP GG795AA MediaSmart Server Micro Tower EX470 picture


Discussions

No Discussions have been posted on this vulnerability.