|   | CIAC Advisory number A- 24NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
 ________________________________________________________________________
 THE COMPUTER INCIDENT ADVISORY CAPABILITY
 
 CIAC
 
 INFORMATION NOTICE
 ________________________________________________________________________
 
 Password Problems with  Unisys U5000 /etc/passwd
 
 Date 08, 1990, 15:00 PST                                 Number A-24
 
 The following advisory was issued by the National Computer Emergency
 Response Team (CERT) and has been relayed via the Defense
 Communications Agency's Security Coordination Center and the various
 Emergency Response Teams in the Department of Defense.  This unedited
 notice is reproduced below.
 
 CERT Advisory
 May 7, 1990
 Unisys U5000 /etc/passwd problem
 
 The CERT/CC has recently verified several reports of unauthorized access
 to Internet connected Unisys systems.  The intruder(s) gained access to
 these systems by logging into vendor supplied default accounts; accounts
 that had not been given passwords by the systems' owners.
 
 Gary Garb, Corporate Computer Security Officer for Unisys Corporation,
 states:
 
 "The Unisys U5000 series UNIX systems are delivered with a number of
 system logins.  The logins are NOT password protected when the
 customer receives the system.  Unless the customer secures these logins,
 the system is vulnerable to unauthorized access."
 
 "A complete list of these logins can be found in the /etc/passwd file.
 Each login is described by one record in /etc/passwd which contains a
 number of fields separated by colons.  The second field normally would
 contain the encrypted password.  The system logins will initially have
 a null second field (indicated by two adjacent colons) in their descriptive
 records in /etc/passwd."
 
 "The U5000/80/85/90/95 System V Administration Guide, Volume 1 (UP13679)
 begins with a chapter on "System Identification and Security".  On page 1-2
 it states, "All logins should have passwords ... Logins that are not needed
 should be either removed (by deleting from /etc/passwd) or blocked (by
 locking the login as described in the section "Locking Unused Logins" on
 page 1-8).  The Guide contains complete instructions on controlling logins
 and passwords."
 
 "It is the user's (system administrator's) responsibility to thoroughly
 read the Guide and to ensure the security of the system.  *Securing the
 login entries should be of the highest priority and should be accomplished
 before anyone else has access to the system.*"
 
 The CERT/CC urges administrators of Unisys systems, as well as administrators
 of systems provided by other vendors,  to check their systems and insure all
 accounts are protected by passwords; passwords that are different from the
 default passwords provided by the vendor.
 
 Questions regarding the security aspects of Unisys systems should be directed
 to:
 Gary Garb, Corporate Security Officer
 Unisys Corporation
 (215) 986-4038
 
 For additional information or assistance, please contact CIAC:
 David S. Brown
 (415) 423-9878 or (FTS) 543-9878
 FAX:  (415) 294-5054, (415) 423-0913 or (415) 422-4294
 
 Neither the United States Government nor the University of California
 nor any of their employees, makes any warranty, expressed or implied,
 or assumes any legal liability or responsibility for the accuracy,
 completeness, or usefulness of any information, product, or process
 disclosed, or represents that its use would not infringe privately
 owned rights.  Reference herein to any specific commercial products,
 process, or service by trade name, trademark manufacturer, or
 otherwise, does not necessarily constitute or imply its endorsement,
 recommendation, or favoring by the United States Government or the
 University of California.  The views and opinions of authors expressed
 herein do not necessarily state or reflect those of the United States
 Government nor the University of California, and shall not be used for
 advertising or product endorsement purposes.
 
 |   |