=============================================================================== Security Advisory CERT-NL =============================================================================== Author/Source : CERT-NL Index : S-92-09 Distribution : SURFnet Constituency Page : 1 Classification: External Version: final Subject : AIX Anon. FTP Vulnerability Date : 27-apr-92 =============================================================================== CERT-NL (SURFnet Computer Emergency Response Team) has received information concerning a security problem in AIX Anon. FTP. CERT-NL wishes to thank CERT/CC for bringing this to our attention. =========================================================================== CA-92:09 CERT Advisory April 27, 1992 AIX Anonymous FTP Vulnerability --------------------------------------------------------------------------- The Computer Emergency Response Team/Coordination Center (CERT/CC) has received information concerning a vulnerability in the anonymous FTP configuration in all versions of AIX. IBM is aware of this problem and a fix is available as apar number "ix23944". This patch is available for all AIX releases from "GOLD". IBM customers may call IBM Support (800-237-5511) and ask that the fix be shipped to them. Patches may be obtained outside the U.S. by contacting your local IBM representative. The fix will appear in the upcoming 2009 update and the next release of AIX. --------------------------------------------------------------------------- I. Description Previous versions of the anonymous FTP installation script, /usr/lpp/tcpip/samples/anon.ftp, incorrectly configured various files and directories. II. Impact Remote users can execute unauthorized commands and gain access to the system if anonymous FTP has been installed. III. Solution A. Obtain the fix from IBM Support. The fix contains three files: a "readme" file (README.a23944), the fix installation script (install.a23944), and an archive containing the updated files (PATCH.a23944.Z). B. Install the fix following the instructions in the README file. --------------------------------------------------------------------------- The CERT/CC would like to thank Charles McGuire of the Computer Science Department, the University of Montana for bringing this security vulnerability to our attention and IBM for their response to the problem. --------------------------------------------------------------------------- ============================================================================== CERT-NL is the Computer Emergency Response Team, located in The Netherlands. CERT-NL is a Full Member of the Forum of Incident Response and Security Teams (FIRST). The constituency of CERT-NL are the SURFnet connected institutions. Past CERT-NL Security Bulletins and other CERT-NL related material can be found on the anonymous FTP server of SURFnet bv: "ftp.nic.surfnet.nl" [192.87.46.3], in the directory "netman/cert-nl". This information is also available using email. Send an email saying "help" to "mailserv@nic.surfnet.nl". In case of computer or network security problems please contact CERT-NL or the CERT of your own constituency. Please be aware of the fact that we are are one hour ahead of Universal Time Coordinated (i.e. UTC+0100). Email: cert-nl@surfnet.nl Phone: +31 30 310290 Fax: +31 30 340903 Snailmail: SURFnet bv Attn. CERT-NL P.O. Box 19035 NL - 3501 DA UTRECHT The Netherlands A 7*24h phonenumber is available to SURFnet SSC's and FIRST members on request ==============================================================================