A security flaw which allows for potential unauthorized root access in VERITAS Cluster Server (tm) for all UNIX platforms has been discovered

Article:TECH34104  |  Created: 2004-01-27  |  Updated: 2004-01-27  |  Article URL http://www.symantec.com/docs/TECH34104
Article Type
Technical Solution

Product(s)

Environment

Issue



A security flaw which allows for potential unauthorized root access in VERITAS Cluster Server (tm) for all UNIX platforms has been discovered

Solution



This Software Alert was updated Oct. 26th, 2004 to provide more detail.

The potential for a serious system security breach has been found to exist in all versions of VERITAS Cluster Server for Solaris, HP-UX, AIX, and Linux.  Systems running unpatched versions of VERITAS Cluster Server are potentially vulnerable to unauthorized users gaining root access.  Users must have local accounts to breach system security, and it is not possible to breach system security remotely.  The potential problem has been addressed for Solaris, HP-UX, AIX, and Linux versions of Cluster Server in the patches listed below.  It is highly recommended that all installations of Cluster Server be updated to include the fix.  If you have VERITAS Cluster Server 4.0 on Solaris and have already applied MP1, then this issue is already resolved in your environment.  This issue does not exist on any version of VERITAS Cluster Server for Windows.


To obtain the patch needed for your installation of Cluster Server, follow these steps:

1. Find the appropriate UNIX platform and version in the list below
2. Verify that you have the appropriate version of Cluster Server installed on which to apply the patch. For example,  customers running Cluster Server 3.5 P1 for Solaris must upgrade to Cluster Server 3.5 P3 (available in 3.5 Maintenance Pack 3) before applying the security patch. Check the table below
3. Open and read the listed TechFile for your platform (the TechFile numbers in the list below are links to the document)
4. Download the patch directly from that TechFile

Note: If using VERITAS CommandCentral (tm) Availability, you must apply the Command Central Availability patch from TechFile  http://support.veritas.com/docs/270142 for Command Central Availability to work with Cluster Server after having applied any of the patches for the security issue.

If using VERITAS Traffic Director (tm), you must apply the Traffic Director patch from TechFile  http://support.veritas.com/docs/272322 for Traffic Director to work with Cluster Server after having applied any of the patches below.


 
PlatformCD release versionVCS versionTechFileChecking the VCS version
Solaris3.5 MP33.5p3270071pkginfo VRTSvcs
Solaris4.04.0269487pkginfo VRTSvcs
HP-UX3.5 Update 23.5p1270074swlist VRTSvcs
AIX3.5 MP13.5p1270090lslpp -L VRTSvcs.rte
RedHat Advanced Server 2.1 i6862.2 MP22.2p2270095rpm -qa VRTSvcs
RedHat Enterprise Linux 3.0 i6862.2 MP22.2p2270096rpm -qa VRTSvcs
RedHat Enterprise Linux 3.0 update 2 IA642.2 MP22.2p2270097rpm -qa VRTSvcs
SuSE SLES 8 SP32.2 MP22.2p2270092rpm -qa VRTSvcs
ESX2.2 MP22.2p2271277rpm -qa VRTSvcs

Note: Because this is a security issue, VERITAS will not publicly disclose details of this issue. If you require assistance in applying the patch or insuring that your system is upgraded to the necessary levels, or assistance in determining which systems are potentially vulnerable to this issue, please contact VERITAS Technical Support.


Supplemental Materials

SourceiTools
Value147547
DescriptionPotential security flaw found


Legacy ID



271040


Article URL http://www.symantec.com/docs/TECH34104


Terms of use for this information are found in Legal Notices