DEC Information for VU#10277

Various shells create temporary files insecurely when using << operator



Vendor Statement

TITLE: Tru64 UNIX Potential Security Vulnerability,
      Privileged App. Core Files and Temp File/Symbolic
      Links With Temp Files (SSRT1-41U, SSRT0742U, SSRT0759U)

NOTICE: There are no restrictions for distribution of
       this advisory provided that it remains complete and intact.


SOURCE: Compaq Computer Corporation
       Compaq Services
       Software Security Response Team



(1). (SSRT1-41U) It has been reported to Compaq that
Tru64 UNIX has a potential security vulnerability with
it's utilization of temporary files in the shell programs
and system startup or management scripts.

Because the potential security vulnerability can only be
exploited by users who have access to your local security
domain, the risk is diminished.   Many systems operate in
a "turn key" mode where login access exists only for system
administration. These systems are not at risk.
Examples of these systems are file servers and web servers.

There are things that can be done to reduce the potential
vulnerability and exposure. A set of Compaq guidelines are
available from the Compaq Services web page at:

(2). (SSRT0742U, SSRT0759U) A potential security vulnerability
has been reported, where under certain circumstances, system
integrity may be compromised. This may be in the form of
improper privileged application core file access.


All supported versions as well as recent prior versions.
The affected versions include but are not limited to Tru64 UNIX
versions V5.1a, V5.1, V5.0a, V5.0, V4.0g, V4.0f and V4.0d.


Early Release Patches (ERPs) are available for all supported
versions of Tru64 UNIX Tru64 UNIX 4.0F, 4.0G, 5.0A, 5.1 and 5.1A
and as a courtesy, for V4.0D and V4.0F as support for these two have
just recently ended.

To obtain a the patch or patches needed, connect to the
FTP site
choose the version directory required and download the
appropriate patch.

Early Release Patches

 Until the Tru64 UNIX fixes are generally available in
mainstream patch kits, Compaq recommends use of the following
Early Release Patches(ERP) kits:

 Tru64 UNIX 4.0D
  Prerequisite: 4.0D with Patch Kit 9 (BL17) installed
  ERP Kit Name:  DUV40DB17-C0061401-12858-E-20020115.tar
  Kit Location:

 Tru64 UNIX 4.0F:
  Prerequisite:  4.0F with Patch Kit 6 (BL17) installed
  ERP Kit Name:  DUV40FB17-C0061801-12860-E-20020115.tar
  Kit Location:

   Prerequisite:  4.0F with Patch Kit 7 (BL18) installed
  ERP Kit Name:  DUV40FB18-C0065000-12930-E-20020122.tar
  Kit Location:

 Tru64 UNIX 4.0G:
  Prerequisite:  4.0G with Patch Kit 3 (BL17) installed
  ERP Kit Name:  T64V40GB17-C0009303-12856-E-20020115.tar
  Kit Location:

 Tru64 UNIX 5.0:
  Prerequisite:  5.0 with Patch Kit 4 (BL17) installed
  ERP Kit Name:  T64V50B17-C0006900-12861-E-20020115.tar
  Kit Location:

 Tru64 UNIX 5.0A:
  Prerequisite:  5.0A with Patch Kit 3 (BL17) installed
  ERP Kit Name:  T64V50AB17-C0017601-12862-E-20020115.tar
  Kit Location:

 Tru64 UNIX 5.1:
  Prerequisite:  5.1 with Patch Kit 3 (BL17) installed
  ERP Kit Name:  T64V51B17-C0095501-12931-E-20020122.tar
  Kit Location:

   Prerequisite:  5.1 with Patch Kit 4 (BL18) installed
  ERP Kit Name:  T64V51B18-C0094800-12864-E-20020115.tar
  Kit Location:

 Tru64 UNIX 5.1A:
  Prerequisite:  5.1A with Patch Kit 1 (BL1) installed
  ERP Kit Name:  T64V51AB1-C0008900-12954-E-20020124.tar
  Kit Location:

 MD5 and SHA1 checksums are available in the public patch notice for
the ERP kits. You can find information on how to verify MD5 and SHA1
checksums at:

The fixes contained in the early release patch (ERP) kits will be
available in the next aggregate patch kits for each supported product
release as follows:
- Tru64 UNIX 4.0F PK8
- Tru64 UNIX 4.0G PK4
- Tru64 UNIX 5.0A PK4
- Tru64 UNIX 5.1  PK5
- Tru64 UNIX 5.1A PK2

  NOTE: (1)  Please review the README file(s) for each patch prior
            to installation.

After completing the update, Compaq strongly recommends that
you perform an immediate backup of your system disk so that
any subsequent restore operations begin with updated software.
Otherwise, you must reapply the update after a future
restore operation. Also, if at some future time you upgrade your
system to a later patch version, you may need to reapply the
appropriate update.


For further information, please contact your normal
Compaq Global Services support channel.


To subscribe to automatically receive future Security
Advisories from the Compaq's Software Security Response Team via
electronic mail:


To report a potential security vulnerability with any Compaq
supported product, send email to:

Compaq appreciates your cooperation and patience. We regret
any inconvenience applying this information may cause. As
always, Compaq urges you to periodically review your system
management and security procedures. Compaq will continue to
review and enhance the security features of its products and
work with customers to maintain and improve the security
and integrity of their systems.

"Compaq is broadly distributing this Security Advisory to
notify all users of Compaq products of the important security
information contained in this Advisory. Compaq recommends that
all users determine the applicability of this information to
their individual situations and take appropriate action. Compaq
does not warrant that this information is necessarily accurate or
complete for all user situations and, consequently, Compaq
will not be responsible for any damages resulting from user's use
or disregard of the information provided in this Advisory."

Copyright 2002 Compaq Computer Corporation. All rights reserved.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



If you have feedback, comments, or additional information about this vulnerability, please send email to Compaq Computer Corporation.

Please see: for the patch/security information; for the actual patches.

If you have feedback, comments, or additional information about this vulnerability, please send us email.