Child pages
  • CERT Advisory CA-1990-08 IRIX 3.3 and 3.31 /usr/sbin/Mail

Pages in the Historical section of this site are provided for historical purposes, they are no longer maintained. Links may not work.

Skip to end of metadata
Go to start of metadata
Original issue date: October 31, 1990
Last revised: September 17, 1997
Attached Copyright statement

A complete revision history is at the end of this file.

The CERT/CC has received the following report of a vulnerability in /usr/sbin/Mail, present only in IRIX 3.3 and 3.3.1. This information was provided to the CERT/CC by Robert Stephens, of Silicon Graphics Inc.


I. Description

/usr/sbin/Mail can fail to reset its group id to the group id of the caller.

II. Impact

Can allow any user logged onto the system to read any other user's (including root's) mail.

III. Solution

A fixed /usr/sbin/Mail binary has been made available for anonymous ftp from SGI.COM ([192.48.153.1]). The correct binary can be found at:

sgi/Mail/Mail

under the ftp directory.

Note that this binary must be installed with the same group (mail) and permissions (2755) as your existing 3.3 or 3.3.1 /usr/sbin/Mail.

For further questions, please contact your Silicon Graphics support center (Geometry Partners HOTLINE number: (800) 345-0222)


Copyright 1990 Carnegie Mellon University.


Revision History
September 17,1997  Attached Copyright Statement
  • No labels