COMMAND

    cdmount

SYSTEMS AFFECTED

    AIX

PROBLEM

    Following is based on Internet Security Systems Security Advisory.
    The  AIX  cdmount  program  allows  regular  users to mount CD-ROM
    filesystems.  This program is basically a SUID to root wrapper  of
    the mount command.  Insecure handling of the arguments to  cdmount
    may allow a local regular user to execute commands as root.  Local
    users may gain root privileges.

    Affected systems are AIX systems with the LPP UMS.objects  2.3.0.0
    and below installed.   Use the command  'lslpp -l UMS.objects'  to
    verify if a vulnerable version is installed.

    The cdmount program  is part of  the AIX UltiMedia  Services (UMS)
    package. UMS provides multimedia applications to AIX workstations.
    The cdmount program is normally used as a helper to UMS multimedia
    players.  It has SUID  root permissions to allow regular  users to
    mount a  CD-ROM.   The system()library  subroutine is  used within
    cdmount  to  invoke  the  mount  program..  This subroutine spawns
    a shell to  execute the mount  command with arguments  provided by
    the user.  An attacker  may execute arbitrary commands as  root by
    calling cdmount with arguments containing shell metacharacters.

SOLUTION

    ISS recommends removing the SUID bit from cdmount by executing the
    following command:

        # chmod 555 /usr/lpp/UMS/bin/cdmount

    IBM  is  currently  working  on  the  following  APAR  (Authorized
    Problem Analysis Report), which will be available soon:

        APAR 4.3.x:  IY10903

    Until the official fix is available, if UMS is not being used  IBM
    recommends uninstalling UMS or removing the SUID bit from cdmount.
    APARs  may  be  ordered  using  Electronic  Fix  Distribution (via
    FixDist) or from the IBM Support Center.