LSOFT-UPDATES Archives

L-Soft Product Updates

L-Soft Product Updates

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
L-Soft Security Advisory <[log in to unmask]>
Reply To:
L-Soft Security Advisory <[log in to unmask]>
Date:
Wed, 25 May 2005 19:04:37 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (163 lines)
*************************************************************************
*************************** SECURITY ADVISORY ***************************
*************************************************************************

A security  exposure has been  discovered and  fixed in the  LISTSERV web
interface (including  LISTSERV Maestro, LISTSERV HPO,  LISTSERV Lite, and
LISTSERV Free Edition).  L-Soft recommends that all  affected users apply
the patch immediately.

------------------------------- ABSTRACT --------------------------------
PRODUCTS AFFECTED:

- LISTSERV version 14.3 (confirmed), including LISTSERV Lite and HPO.

- LISTSERV version 1.8e (confirmed), including LISTSERV Lite and HPO.

- LISTSERV version 1.8d (inferred), including LISTSERV Lite and HPO.

- Older versions are not believed to be affected.

- LISTSERV Free  Edition is LISTSERV  Lite with special  licensing terms.
  What applies to LISTSERV Lite in this advisory applies also to LISTSERV
  Free Edition.

- Support  for version  1.8e  (released May  22,  2002) was  discontinued
  December 31, 2004. No patches are available for version 1.8e or older.

OPERATING SYSTEMS AFFECTED:

- Windows, unix (all vendors), OpenVMS AXP (confirmed).

- VM sites are not affected.

EXCEPTIONS/SPECIAL NOTES:

- Customers not using the LISTSERV web interface are not vulnerable.

- The LISTSERV Maestro web interface is not vulnerable; however, LISTSERV
  Maestro installations typically host both LISTSERV and LISTSERV Maestro
  web interfaces, and in such cases they are vulnerable.

- The 10 January 2005 and later  builds of LISTSERV version 14.3 are less
  vulnerable, but L-Soft recommends that they be upgraded anyway.

- LISTSERV version 14.4 (beta) is not vulnerable.

EXPOSURE:

On a correctly configured LISTSERV  installation running the LISTSERV web
interface  with normal  CGI privileges,  intruders  may be  able to  gain
non-privileged access to the system on  which the web interface script is
running. The  executable in  question is called  'WA.EXE' on  Windows and
VMS, and  'wa' on unix.  In the remainder  of this advisory,  this script
will be called "WA" regardless of operating system.

The  exposure  may  be more  severe  if  WA  is  configured to  run  with
privileges beyond  those recommended  by L-Soft or,  for Windows,  if the
system partition is using the FAT or FAT32 file system.

SOLUTION:

- Apply 2005a level set.

OR:

- Update just WA from 2005a level set.

The vulnerability cannot be circumvented, other than by disabling the web
interface altogether.

RISK RATING: HIGH

- Date of first reported exploit: May 20, 2005.

- Exploit widely known within hacker community since: no known incident.

INCIDENT CHRONOLOGY:

2005-05-20 Initial report to L-Soft support
2005-05-20 More information requested
2005-05-21 Detailed information received
2005-05-21 Internal escalation
2005-05-22 Problem not reproduced
2005-05-23 Problem reproduced
2005-05-23 Emergency correction initiated
2005-05-24 Patch A1 ready
2005-05-24 A1 delivered to reporting site
2005-05-24 A1 passed standard internal tests, ready for deployment
2005-05-24 2005a kit generation starting
2005-05-24 2005a kits ready for deployment
2005-05-25 Reporting site confirms A1 removes exposure
2005-05-25 2005a deployed
2005-05-25 Security Advisory distributed to Maintenance customers
2005-05-25 Security Advisory distributed to LSTSRV-L
2005-05-25 Security Advisory distributed to LISTSERV-Developers
2005-05-25 Security Advisory distributed to LISTSERV-Lite
2005-05-25 Security Advisory distributed to Updates-LISTSERV

---------------------------- END OF ABSTRACT ----------------------------

THE 2005a LEVEL SET
-------------------

The only change in the 2005a level set is an updated WA executable.

There is no  user-visible change or new functionality  after applying the
2005a level set.

L-Soft  intends to  deliver new  functionality to  customers through  the
upcoming  14.4 release,  which is  currently in  beta. Future  14.3 level
sets, if any, are not expected to include any new functionality.

APPLYING THE 2005a LEVEL SET
----------------------------

This level set can be installed as a normal level set upgrade, which will
require that  LISTSERV be stopped during  the upgrade, or you  can opt to
extract the updated WA executable from the kit and replace it on the fly,
which is less disruptive, but also more complicated. If in doubt, perform
a normal upgrade.

If you perform an  on-the-fly upgrade, you will have to  update WA in two
locations: your web server's CGI  directory, and LISTSERV's own directory
tree. If you do not update the CGI directory, the patch is not active. If
you do not update the copy of  WA in the LISTSERV directory and later use
one  of the  L-Soft setup/installation  tools to  move your  LISTSERV web
directory,  the tool  may copy  the unpatched  version of  WA to  the new
location and re-introduce the vulnerability.

Regardless of which  method you choose, be sure to  verify that the patch
is online by loading the following URL:

- Windows, VMS: http://.../wa.exe?DEBUG-SHOW-VERSION

- unix: http://.../wa?DEBUG-SHOW-VERSION

The compilation date should read 24 May 2005 or later.

DOWNLOADING THE 2005a LEVEL SET
-------------------------------

To download the 2005a level set, go  to L-Soft's web site and download an
evaluation copy  of LISTSERV  Lite if  this is what  you are  running, or
LISTSERV Classic  in all other  cases (Classic, HPO, Maestro,  etc). This
evaluation kit will upgrade your  existing LISTSERV installation. It will
NOT turn it into an evaluation version.

The kits can be found at:

http://www.lsoft.com/download/listserv.asp

http://www.lsoft.com/download/listservlite.asp

MacOS beta sites will instead find the  level set at the same location as
the original beta installation kits.

ACKNOWLEDGEMENTS
----------------

L-Soft would like to thank Peter Winter-Smith of Next Generation Security
Software (www.ngssoftware.com)  for reporting this problem  and providing
information and assistance well past regular business hours.

ATOM RSS1 RSS2