[LWN Logo]

Date: 24 Aug 1999 18:09:07 -0000
From: listmaster@locutus.calderasystems.com
To: announce@lists.calderasystems.com
Subject: Security Advisory 22

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		Security issues with telnetd and libcurses
Advisory number: 	CSSA-1999:022.0
Issue date: 		1999 August, 23
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a vulnerability in the telnet server included in Caldera
   OpenLinux. When connecting, a telnet client transmits the user's
   terminal type to the server. By passing a bogus terminal type, an
   attacker can fool the server into opening and reading almost random files,
   e.g. in the /proc filesystem. On some machines, reading certain files
   below /proc can cause the machine to lock up.

   The same problem exists in setuid applications linked against libncurses,
   such as screen.

2. Vulnerable Versions

   Systems: up to COL 2.2,
   Packages: previous to netkit-telnet-0.12-3
             previous to ncurses-4.2-3

3. Solutions

   The proper solution is to upgrade to the latest packages

	rpm -U netkit-telnet-0.12-3.i386.rpm
	rpm -U ncurses-4.2-3.i386.rpm
        rpm -U ncurses-termcap-devel-static-4.2-3.i386.rpm
        rpm -U ncurses-termcap-devel-4.2-3.i386.rpm
        rpm -U ncurses-devel-4.2-3.i386.rpm
	rpm -U ncurses-devel-static-4.2-3.i386.rpm

4. Location of Fixed Packages

   The upgrade packages can be found on Caldera's FTP site at:

   ftp://ftp.calderasystems.com/pub/OpenLinux/updates/2.2/current/RPMS/

   The corresponding source code package can be found at:

   ftp://ftp.calderaystems.com/pub/OpenLinux/updates/2.2/current/SRPMS


5. Installing Fixed Packages

   Upgrade the affected packages with the following commands:

        rpm -U netkit-telnet-0.12-3.i386.rpm
        rpm -U ncurses-4.2-3.i386.rpm
        rpm -U ncurses-termcap-devel-static-4.2-3.i386.rpm
        rpm -U ncurses-termcap-devel-4.2-3.i386.rpm
        rpm -U ncurses-devel-4.2-3.i386.rpm
        rpm -U ncurses-devel-static-4.2-3.i386.rpm

6. Verification

   825d8c5336581492ef7d59d857aa6d06  RPMS/ncurses-4.2-3.i386.rpm
   2b91f24d44ead31c9c6da0ac427caf53  RPMS/ncurses-devel-4.2-3.i386.rpm
   ffb4eaa3c04a1a2825f14535706ed4e0  RPMS/ncurses-devel-static-4.2-3.i386.rpm
   d17e8a8fd9caba38ad317c5171173848  RPMS/ncurses-termcap-devel-4.2-3.i386.rpm
   3a43b39d48258635677ce91221393add  RPMS/ncurses-termcap-devel-static-4.2-3.i386.rpm
   30c87d77a1ad2731931b3090fabd00b6  RPMS/netkit-telnet-0.12-3.i386.rpm
   0aaae02a2bd53ed55eb9be736b5e9338  SRPMS/ncurses-4.2-3.src.rpm
   6bd78bbefc87f877a17bbc0f04596d6c  SRPMS/netkit-telnet-0.12-3.src.rpm


7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/news/security/index.html

   This security fix closes Caldera's internal Problem Report 5086

8. Disclaimer
   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

______________________________________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBN8JnHOn+9R4958LpAQGdUwP+L1PGz0+5AiGzZfT0I8TfQWrQedKWuY11
uWu/eps7h3hMLyLr6EnTG0s/WhIXjT1MfBmHvrj6If4GC1jaylDe9fLzT5Npuy3K
QHfuiczmmJuzZL0/v9K7sEyMRmlBRtsi1dgzbjDmiaX1cM5JnlG6Gd7V1uBafV0v
YprgbK2SLwU=
=r9j4
-----END PGP SIGNATURE-----
 --
Note: To learn how to use this list server, email a "help" command to
majordomo@lists.calderasystems.com.