Original issue date: February 24, 1994<BR>
Last revised: September 19, 1997<BR>
Updated copyright statement

<P>A complete revision history is at the end of this file.

<P>The CERT Coordination Center has received information concerning
vulnerabilities in the &quot;bosext1.extcmds.obj&quot; Licensed
Program Product (performance tools).  These problems exist on IBM AIX
3.2.4 systems that have Program Temporary Fixes (PTFs) U420020 or
U422510 installed and on all AIX 3.2.5 systems.

<P>CERT recommends that affected sites apply the workaround provided
in section III below.

<P>
<HR>
<H2>I. Description</H2>

<P>Vulnerabilities exist in the bosext1.extcmds.obj performance tools
in AIX 3.2.5 and in those AIX 3.2.4 systems with Program Temporary
Fixes (PTFs) U420020 or U422510 installed.  These problems do not
exist in earlier versions of AIX.

<H2>II. Impact</H2>

<P>Local users can gain unauthorized root access to the system.

<H2>III.    Workaround</H2>


<H3>A. The recommended workaround is to change the permissions of all the programs in the /usr/lpp/bosperf directory structure</H3>
so that the setuid bit is removed and the programs can be
executed only by 'root'.  This can be accomplished as follows:
<PRE>
                % su root<BR>
                # chmod -R u-s,og= /usr/lpp/bosperf/*
</PRE>
The programs affected by this workaround include:
filemon, fileplace, genkex, genkld, genld, lvedit,
netpmon, rmap, rmss, stripnm, svmon, tprof

<P>As a result of this workaround, these programs will no longer be
executable by users other than 'root'.

<H3>B. Patches for these problems can be ordered as Authorized Program Analysis Report (APAR) IX42332.</H3>

<P>To order an APAR from IBM call 1-800-237-5511 and ask for shipment
as soon as it is available.  APARs may be obtained outside the U.S. by
contacting your local IBM representative.

<P>Any further information that we receive on APAR IX42332 will
           be available by anonymous FTP in the file
pub/cert_advisories/CA-94.03.README on ftp.cert.org.

<P><HR>

<P>The CERT Coordination Center wishes to thank Jill K. Bowyer of
USAF/DISA for reporting this problem and IBM for their prompt response
to this problem.

<HR>

<!--#include virtual="/include/footer_nocopyright.html" -->
<P>Copyright 1994 Carnegie Mellon University.</P>

<HR>

Revision History
<PRE>
September 19,1997  Updated Copyright Statement
</PRE>