[LWN Logo]
[Timeline]
Date: Wed, 14 Jun 2000 17:32:08 -0600
From: Technical Support <support@phoenix.calderasystems.com>
To: announce@lists.calderasystems.com, bugtraq@securityfocus.com,
Subject: Security Advisory: local ROOT exploit in BRU

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera Systems, Inc.  Security Advisory

Subject:		local ROOT exploit in BRU
Advisory number: 	CSSA-2000-018.0
Issue date: 		2000 June, 14
Cross reference:
______________________________________________________________________________


1. Problem Description

   There is a serious vulnerability in the commandline option and logfile
   handling of the BRU Backup Utility which can be exploited by a local
   attacker to gain root access to the machine.

   We ship BRU on the commercial software CD-ROM of our OpenLinux productline,
   but it's not installed by default.

2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux Desktop 2.3        up to BRU-15.1P-4

   OpenLinux eServer 2.3        not included
   and OpenLinux eBuilder

   OpenLinux eDesktop 2.4	up to BRU-15.1D-8


3. Solution

   Workaround:

   If you do not need BRU, issue as root:

        rpm -e BRU

   Otherwise remove the suid-root bit by issuing as root:

        chmod u-s /bru/bru /bin/bru

   If you want to use BRU as a normal user, you have to point the 'BRUEXECLOG'
   environment variable to a file writeable by the user, like

    	bash/sh:

        	BRUEXECLOG=~/.brulog
        	export BRUEXECLOG

    	tcsh/csh:

        	setenv BRUEXECLOG=~/.brulog

   Also do ignore the
 	bru: [W171] warning - BRU must be owned by root and have suid bit set
   warning on further BRU calls.

4. OpenLinux Desktop 2.3

   See workaround above

5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0

   not included

6. OpenLinux eDesktop 2.4

   See workaround above

7. References

   This and other Caldera security resources are located at:

   http://www.calderasystems.com/support/security/index.html

8. Disclaimer

   Caldera Systems, Inc. is not responsible for the misuse of any of the
   information we provide on this website and/or through our security
   advisories. Our advisories are a service to our customers intended to
   promote secure installation and use of Caldera OpenLinux.

9. Acknowledgements

   Caldera Systems wishes to thank the Network Security department of Speakeasy
   Networks for discovering and reporting the bug, and Enhanced Software
   Technologies, Inc. for suggesting the workaround.

______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5R3Fl18sy83A/qfwRArQvAJ4kXFmdyA+bAEeaOkYmsfsJkhNpxACfYYxP
/TBrKh4Lxxpb/Pe9Z/pMMnw=
=K8/3
-----END PGP SIGNATURE-----