TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Buffer Overflow in "Super" package in Debian Linux



Debian users of linux.

> ISS Security Advisory
> February 15, 1999
> 
> Buffer Overflow in "Super" package in Debian Linux
> 
> 
> Synopsis:
> 
> Internet Security Systems (ISS) X-Force has discovered a vulnerability in
> the system administration utility, "Super".  Super is used by 
> administrators to allow certain users to execute commands with root
> privileges.  The vulnerability is distributed with Debian Linux.  It may
> allow local attackers to compromise root access.  Super is a GNU
> copylefted package that is distributed with recent Debian Linux
> distributions, but it can be installed and configured for many Unix
> variants.  
> 
> 
> Affected versions:
> 
> ISS X-Force has determined that version 3.9.6 through version 3.11.6 are
> vulnerable.  All versions of Super distributed with Debian Linux are
> vulnerable.  Execute the following command to determine version
> information:
> 
> # /usr/bin/super -V
> 
> 
> Fix Information:
> 
> Super 3.11.7 is available at:
> ftp.ucolick.org:/pub/users/will/super-3.11.7.tar.gz
> 
> The new version of Super will be available soon on the mirror:
> ftp.onshore.com:/pub/mirror/software/super
> 
> Please refer to these locations for fixes which are included in
> Super version 3.11.7.
> 
> Description:
> 
> Super is a utility that allows authorized users to execute commands with
> root privileges.  It is intended to be an alternate to setuid scripts,
> which are inherently dangerous.  A buffer overflow exists in Super that
> may allow attackers to take advantage of its setuid configuration to gain
> root access.
> 
> 
> Recommended Action:
> 
> Version 3.11.7 should be installed immediately. Administrators should 
> take care to disable setuid root utilities that are not used by regular 
> users.  To disable Super permanently, execute the following command 
> as root to disable the setuid bit:
> 
> # chmod 755 /usr/bin/super
> 
> __________
> 
> Copyright (c) 1999 by Internet Security Systems, Inc.
> 
> Permission is hereby granted for the redistribution of this alert
> electronically.  It is not to be edited in any way without express
> consent of X-Force.  If you wish to reprint the whole or any part of this
> alert in any other medium excluding electronic medium, please e-mail
> xforce@iss.net for permission.
> 
> Disclaimer:
> 
> The information within this paper may change without notice. Use of this
> information constitutes acceptance for use in an AS IS condition. There
> are NO warranties with regard to this information. In no event shall the
> author be liable for any damages whatsoever arising out of or in
> connection with the use or spread of this information. Any use of this
> information is at the user's own risk.
> 
> X-Force PGP Key available at: http://www.iss.net/xforce/sensitive.html,
> as well as on MIT's PGP key server and PGP.com's key server.
> 
> X-Force Vulnerability and Threat Database: http://www.iss.net/xforce
> 
> Please send suggestions, updates, and comments to: X-Force
> <xforce@iss.net> of Internet Security Systems, Inc.
> 
-- 
Bob Tanner <tanner@real-time.com>       | Phone : (612)943-8700
http://www.real-time.com                | Fax   : (612)943-8500
Key fingerprint =  6C E9 51 4F D5 3E 4C 66 62 A9 10 E5 35 85 39 D9