Berkeley CSUA MOTD:Entry 31015
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2004/6/25-27 [Computer/SW/OS/Misc, Computer/SW/OS/Solaris] UID:31015 Activity:nil
6/25    If you are running ISC Dhcpd 3.0.1rc{12,13} consider upgrading
        to rc14:
        http://www.us-cert.gov/cas/techalerts/TA04-174A.html
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2005/11/22-23 [Computer/SW/OS/Solaris, Computer/SW/Unix] UID:40690 Activity:nil
11/22   Is there a native process in Unix (SunOS 5.7) that logs port traffic?
        Barring that, do you know of any good software that would do the trick?
        SdTFW for "logging port traffic unix" but not finding what I'm looking
        for. TIA. --erikred
        \_ tcpdump -w
        \_ snoop.  Ethereal.  -John
	...
2005/6/23-25 [Computer/SW/OS/Solaris] UID:38267 Activity:nil
6/23    Stoopid Tech Q: Is there a version of CDE for SunOS 5.7?
        \_ Updated Q: how the hell do I get the CDE running from the
           command line?
           \_ /usr/dt/bin/dtsession?
              \_ got it, thanks.
              \_ turns out /usr/dt/bin/dtlogin -daemon does the trick.
	...
2005/6/15-17 [Computer/SW/Security, Academia/Berkeley/CSUA/Motd] UID:38139 Activity:nil
6/15    Attempting to sftp to http://csua.berkeley.edu. Got password from key.
        Entered password and got back:
        Received message too long 1701996907
        Wtf?
        \_ password from key.  since sftp uses ssh, shouldn't you just
           use your normal password?
	...
2005/3/9 [Computer/SW/Unix, Computer/SW/OS/Solaris] UID:36604 Activity:low
3/9     After I start an xterm in SunOS 5 and Linux, is there any command to
        change the title of the xterm window?  Thanks.
        \_ Check ~geordan/bin/retitle
           \_ That 2 should probably be a 0 -- that way the new title stays
              even when the window is minimized (or whatever the standard
              X term for that is). -alexf
	...
2005/2/23-24 [Computer/SW/OS/Solaris, Computer/SW/Unix] UID:36382 Activity:nil
2/23    Trying to load tcsh on a SunOS 5.7 machine, getting C compiling
        errors. Resources? Suggestions? STFW returns nothing useful.
        \_ what errors?
        \_ Trying to load it or compile it? If you are just trying to load
           it, get it from sunfreeware and pkgadd it.
	...
2004/12/1 [Computer/HW/CPU, Computer/SW/OS/Solaris] UID:35146 Activity:high
12/1    open source sadness, SUN being destroyed by linux..
        \_ More like Sun stupidity by refusing to either
           A) Make Solaris x86 free until it was too late.
           B) Give up on the stupid "java thin client" crap
           C) Open Source Solaris and let people actually write
              drivers for 3rd party peripherals.
	...
2004/5/8-9 [Computer/SW/OS/Linux, Computer/SW/Unix] UID:30108 Activity:very high
5/8     On the linux ls discussion from the other day, this is my take:
        Using/learning linux specific flags is all fine and good, and
        adding new features to old tools is too, but when I have to
        switch between 5 different OSes in a given day, it's simply a
        waste of my time.  There are many ways to solve a given problem.
        Linux's solution always seems to be "add another flag".  If you're
	...
2004/3/8 [Computer/SW/OS/Solaris] UID:12561 Activity:high
3/8     Are there any commands on soda equivalent to prtinfo/psrinfo/isainfo
        on SunOS 5?  Thanks.
        \_ The correct term is "Solaris", not "SunOS 5".
        \_ whats sunos5?
           \_ SunOS foo 5.7 Generic_106541-08 sun4u sparc
              \_ That'd be Solaris 7.
	...
2003/10/1-2 [Computer/SW/OS/Solaris] UID:10403 Activity:nil
10/1    I'm on solaris and trying to increase the number of open file descriptors
        my processes can have. I've used limit and ulimit under zsh and bash,
        respectively, to set these to say, 400. limit and ulimit -a apparently
        confirm these changes. But when I write a program to test this out,
        it still fails after the default of 256 open files. Any idea what I
        might be doing wrong? Thanks.
	...
2003/9/19-20 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Compilers] UID:10257 Activity:nil
9/19    I have something like this:
        unsigned char a;
        char b;
        unsigned short c;
        short d;
        if (a < 9999999) {}
	...
2002/9/12 [Computer/SW/OS/Solaris] UID:25855 Activity:high
9/11    On SunOS 5, how do I use the -k option in "sort" to specify multiple
        sort fields?  I tried "-k start1,stop1 -kstart2,stop2",
        "-k start1,stop1+start2,stop2" and "-k start1,stop1 start2,stop2" but
        none works.  The man page doesn't descript this.  Thanks.
        \_ I never got -k working sanely.  I use the +n format just fine.  I
           use perl if I get desperate.
	...
2002/8/1-2 [Computer/SW/Security] UID:25470 Activity:high
8/1     Bugtraq reports that openssh-3.4p1 was trojanned on http://ftp.openbsd.org,
        and its mirrors.
        \_ Link?  And Is that what happened to csua?
           \_ http://online.securityfocus.com/archive/1/285492/2002-07-29/2002-08-04/0
           \_ Don't think so.  That seems to have affected the
              openssh-portable port.
	...
Cache (2911 bytes)
www.us-cert.gov/cas/techalerts/TA04-174A.html
RFC 2131, "the Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network." The Internet Systems Consortium's (ISC) Dynamic Host Configuration Protocol (DHCP) 3 application contains two vulnerabilities that present several potential buffer overflow conditions. VU#317350 discusses a buffer overflow vulnerability in the temporary storage of log lines. In transactions, ISC DHCPD logs every DHCP packet along with several pieces of descriptive information. The client's DISCOVER and the resulting OFFER, REQUEST, ACK, and NAKs are all logged. In all of these messages, if the client supplied a hostname, then it is also included in the logged line. As part of the DHCP datagram format, a client may specify multiple hostname options, up to 255 bytes per option. If the hostname and options contain only ASCII characters, then the string will pass non-ASCII character filters and be temporarily stored in 1024 byte fixed-length buffers on the stack. If a client supplies enough hostname options, it is possible to overflow the fixed-length buffer. VU#654390 discusses C include files for systems that do not support the bounds checking vsnprintf() function. These files define the bounds checking vsnprintf() to the non-bounds checking vsprintf() function. Since vsprintf() is a function that does not check bounds, the size is discarded, creating the potential for a buffer overflow when client data is supplied. Note that the vsnprintf() statements are defined after the vulnerable code that is discussed in VU#317350. Since the preconditions for this vulnerability are similar to those required to exploit VU#317350, these buffer overflow conditions occur sequentially in the code after the buffer overflow vulnerability discussed in VU#317350, and these issues were discovered and resolved at the same time, there is no known exploit path to exploit these buffer overflow conditions caused by VU#654390. Note that VU#654390 was discovered and exploitable once VU#317350 was resolved. VU#317350 is exploitable for all operating systems and configurations. VU#654390 is only defined for the following operating systems: * AIX * AlphaOS * Cygwin32 * HP-UX * Irix * Linux * NextStep * SCO * SunOS 4 * SunOS 55 * Ultrix All versions of ISC DCHP 3, including all snapshots, betas, and release candidates, contain the flawed code. Impact Exploitation of these vulnerabilities may cause a denial-of-service condition to the DHCP daemon (DHCPD) and may permit a remote attacker to execute arbitrary code on the system with the privileges of the DHCPD process, typically root. org/vuls/id/654390 US-CERT thanks Gregory Duchemin and Solar Designer for discovering, reporting, and resolving this vulnerability. Thanks also to David Hankins of ISC for notifying us of this vulnerability and the technical information provided to create this document.