Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-1999.015 -- NetBSD Security Advisory 1999-002 Security problem with netstat 10 February 1999 =========================================================================== The NetBSD Foundation, Inc. has released the following security advisory regarding a vulnerability with netstat. This vulnerability may allow local users to read any kernel memory location. - -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security Advisory 1999-002 ================================= Topic: Security problem with netstat Version: NetBSD-current from 19980603 to 19990208. Severity: Local users are able to read any kernel memory location. Abstract ======== In the version of netstat between the two dates above, a security hole exists which will allow non-root users to examine any kernel memory location. Technical Details ================= The code which was added to allow printing of kernel protocol control blocks does not have strict checks to make certain the memory being display is a protocol control block. Also, since the block contains information like TCP sequence numbers, users should generally not be allowed to examine these blocks. Solutions and Workarounds ========================= NetBSD-current users should update to a source tree newer than 19990208, or apply this patch and rebuild netstat: ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/patches/19990208-netstat If this action cannot be taken easily, netstat can be disabled for non-root users. chmod 555 /usr/bin/netstat Thanks To ========= Thanks go to Michael Graff <email@example.com> and Charles Hannum <firstname.lastname@example.org> for the discovery and resolution of this bug. More Information ================ Information about NetBSD and NetBSD security can be found at http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/. Copyright 1999, The NetBSD Foundation, Inc. All Rights Reserved. $NetBSD: NetBSD-SA1999-002.txt,v 1.2 1999/02/09 01:27:27 mrg Exp $ - -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQCVAwUBNr/O/T5Ru2/4N2IFAQHoEQQAm9tgcL/9FCCrt+aNUe0oPIgZjlL0w93w qGMo9JeeVx3YdHh9lPo1YH1ra9Jeb5SDVY3d0CJo+hHE5cudKCsMHFj1oKpDr9ZS u9TAk6P8e5FKCUemcLrsYWIo0n+hk8xKyTtXEgjzbDRxJp2VtemiG1hR2Q6yTIex 8dWtyKTd9fI= =6eFn - -----END PGP SIGNATURE----- =========================================================================== This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBNsPtWSh9+71yA2DNAQFGmAP8DcPPMqcVOmEieDoFLURs8dE5+YfJMmmJ 4psieWR5pC/Quzj9+V3We6u5TymJmA9bEQEsUaQTLl8WwajAGoB++N8aoA4JtmaI WoWBs6vbFot8gQGWwKbePzKwrBmZAq+GKs10nqlfd3x4S+05m9MFxVZZ5yb1ALZ4 HzU7GEl1N5c= =kzP6 -----END PGP SIGNATURE-----