About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

CIAC Advisory number A- 24


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
________________________________________________________________________
THE COMPUTER INCIDENT ADVISORY CAPABILITY

CIAC

INFORMATION NOTICE
________________________________________________________________________

Password Problems with Unisys U5000 /etc/passwd

Date 08, 1990, 15:00 PST Number A-24

The following advisory was issued by the National Computer Emergency
Response Team (CERT) and has been relayed via the Defense
Communications Agency's Security Coordination Center and the various
Emergency Response Teams in the Department of Defense. This unedited
notice is reproduced below.

CERT Advisory
May 7, 1990
Unisys U5000 /etc/passwd problem

The CERT/CC has recently verified several reports of unauthorized access
to Internet connected Unisys systems. The intruder(s) gained access to
these systems by logging into vendor supplied default accounts; accounts
that had not been given passwords by the systems' owners.

Gary Garb, Corporate Computer Security Officer for Unisys Corporation,
states:

"The Unisys U5000 series UNIX systems are delivered with a number of
system logins. The logins are NOT password protected when the
customer receives the system. Unless the customer secures these logins,
the system is vulnerable to unauthorized access."

"A complete list of these logins can be found in the /etc/passwd file.
Each login is described by one record in /etc/passwd which contains a
number of fields separated by colons. The second field normally would
contain the encrypted password. The system logins will initially have
a null second field (indicated by two adjacent colons) in their descriptive
records in /etc/passwd."

"The U5000/80/85/90/95 System V Administration Guide, Volume 1 (UP13679)
begins with a chapter on "System Identification and Security". On page 1-2
it states, "All logins should have passwords ... Logins that are not needed
should be either removed (by deleting from /etc/passwd) or blocked (by
locking the login as described in the section "Locking Unused Logins" on
page 1-8). The Guide contains complete instructions on controlling logins
and passwords."

"It is the user's (system administrator's) responsibility to thoroughly
read the Guide and to ensure the security of the system. *Securing the
login entries should be of the highest priority and should be accomplished
before anyone else has access to the system.*"

The CERT/CC urges administrators of Unisys systems, as well as administrators
of systems provided by other vendors, to check their systems and insure all
accounts are protected by passwords; passwords that are different from the
default passwords provided by the vendor.

Questions regarding the security aspects of Unisys systems should be directed
to:
Gary Garb, Corporate Security Officer
Unisys Corporation
(215) 986-4038

For additional information or assistance, please contact CIAC:
David S. Brown
(415) 423-9878 or (FTS) 543-9878
FAX: (415) 294-5054, (415) 423-0913 or (415) 422-4294

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
Book Recommendation
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS

 
www.pigdog.org