CA-94:06.README Last Revised: April 1, 1994 This file is a supplement to the CERT Advisory CA-94:06.utmp.vulnerability of March 21, 1994 and will be updated as additional information becomes available. Corrections: 1) SunOS 4.1.3_U1 (Solaris 1.1.1) is _not_ vulnerable to this problem. Clarifications: 1) If you make /etc/utmp writable only by root, this should only affect programs that allocate pseudo terminal interfaces and want to add an appropriate entry to the /etc/utmp file. Such programs include script(1), cmdtool(1), gfxtool(1), shelltool(1), and tektool(1). These programs will no longer be able to add an entry to /etc/utmp which means that programs such as who(1), syslogd(1), and others that use /etc/utmp will not know that an account is using that pseudo tty. 2) No program should be made setuid root just to workaround this problem. Setuid programs must be written very carefully to avoid creating yet more vulnerabilities. 3) The installation instructions on the syslogd patch do not point out that, until you stop and restart syslogd (or reboot the system), the old version is still running and the security hole has not been closed.