From: SMTP%"\'GALAXY::GLEEVE\'@opus" 10-AUG-1993 09:06:03.41 To: EVERHART CC: Subj: gopher CERT advisory Date: Tue, 10 Aug 1993 7:07:40 -0600 (MDT) From: "GALAXY::GLEEVE"@opus To: everhart@arisia.gce.com X-Vmsmail-To: OPUS::SMTP%"everhart@arisia.gce.com" Message-Id: <930810070740.246@opus> Subject: gopher CERT advisory From: FESTER::SMTP%"ebersman@uunet.uu.net" 10-AUG-1993 00:27:56.59 To: GALAXY::GLEEVE CC: Subj: CERT Advisory - UMN UNIX gopher and gopher+ Vulnerabilities Message-Id: <9308100336.AA17745@cfmartin.UU.NET> Date: Mon, 09 Aug 93 23:35:59 -0400 From: Paul Ebersman Subject: CERT Advisory - UMN UNIX gopher and gopher+ Vulnerabilities Apparently-To: content-length: 4679 ------- Blind-Carbon-Copy To: alter-ops (AlterNet Customers) Reply-To: ops (Network Staff) Subject: CERT Advisory - UMN UNIX gopher and gopher+ Vulnerabilities Organization: UUNET Technologies Inc., Falls Church, VA Date: Mon, 09 Aug 93 23:35:59 -0400 From: Paul Ebersman Since many folks are running gopher servers, I thought this might be of general interest. - -- Paul - ------- Forwarded Message Date: Mon, 09 Aug 93 12:31:46 EDT To: cert-advisory@cert.org From: CERT Advisory Subject: CERT Advisory - UMN UNIX gopher and gopher+ Vulnerabilities =========================================================================== CA-93:11 CERT Advisory August 9, 1993 UMN UNIX gopher and gopher+ Vulnerabilities - - --------------------------------------------------------------------------- The CERT Coordination Center has received information concerning vulnerabilities in versions of the UMN UNIX gopher and gopher+ server and client available before August 6, 1993. Vulnerable versions were available on boombox.micro.umn.edu:/pub/gopher/Unix/gopher1.12s.tar.Z, boombox.micro.umn.edu:/pub/gopher/Unix/gopher2.03.tar.Z, and many other anonymous FTP sites mirroring these software versions. We strongly recommend that any site using versions of UMN UNIX gopher and gopher+ dated prior to August 6, 1993 (including version 1.12, 1.12s, 2.0+, 2.03, and all earlier versions) immediately take corrective action. If you have further questions regarding UMN UNIX gopher or gopher+ software, send e-mail to: gopher@boombox.micro.umn.edu - - --------------------------------------------------------------------------- I. Description Several vulnerabilities have been identified in UMN UNIX gopher and gopher+ when configured as a server or public access client. Intruders are known to have exploited these vulnerabilities to obtain password files. Other actions may also have been taken by intruders exploiting these vulnerabilities. CERT has already contacted those sites currently known to have been victims of these activities. However, sites may want to check for weak passwords, or consider changing passwords, after installing the new gopher software. II. Impact Anyone (remote or local) can potentially gain unrestricted access to the account running the public access client, thereby permitting them to read any files accessible to this account (possibly including /etc/passwd or other sensitive files). In certain configurations, anyone (remote or local) can potentially gain access to any account, including root, on a host configured as a server running gopherd. III. Solution Affected sites should consider disabling gopherd service and public gopher logins until they have installed the new software. New versions of the UMN UNIX gopher and gopher+ software have been released that provide bug fixes and correct these security problems. Sites can obtain these new versions via anonymous FTP from boombox.micro.umn.edu (134.84.132.2). The files are located in: Filename Size Checksum -------- ------ ----------- Gopher: /pub/gopher/Unix/gopher1.12S.tar.Z 306872 46311 300 Gopher+: /pub/gopher/Unix/gopher2.04.tar.Z 294872 29411 288 - - --------------------------------------------------------------------------- The CERT Coordination Center wishes to thank Matt Schroth, Williams College, and others for informing us of these vulnerabilities. We would also like to thank Paul Lindner, University of Minnesota, for his quick response to these problems. - - --------------------------------------------------------------------------- If you believe that your system has been compromised, contact the CERT Coordination Center or your representative in FIRST (Forum of Incident Response and Security Teams). Internet E-mail: cert@cert.org Telephone: 412-268-7090 (24-hour hotline) CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4), and are on call for emergencies during other hours. CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 Past advisories, information about FIRST representatives, and other information related to computer security are available for anonymous FTP from cert.org (192.88.209.5). - ------- End of Forwarded Message ------- End of Blind-Carbon-Copy