Last revised: September 17, 1997
Attached Copyright statement
A complete revision history is at the end of this file.
The CERT/CC has received the following report of a vulnerability in /usr/sbin/Mail, present only in IRIX 3.3 and 3.3.1. This information was provided to the CERT/CC by Robert Stephens, of Silicon Graphics Inc.
I. Description
/usr/sbin/Mail can fail to reset its group id to the group id of the caller.II. Impact
Can allow any user logged onto the system to read any other user's (including root's) mail.III. Solution
A fixed /usr/sbin/Mail binary has been made available for anonymous ftp from SGI.COM ([192.48.153.1]). The correct binary can be found at:sgi/Mail/Mail
under the ftp directory.
Note that this binary must be installed with the same group (mail) and permissions (2755) as your existing 3.3 or 3.3.1 /usr/sbin/Mail.
For further questions, please contact your Silicon Graphics support center (Geometry Partners HOTLINE number: (800) 345-0222)
Copyright 1990 Carnegie Mellon University.
Revision History
September 17,1997 Attached Copyright Statement