COMMAND
Tivoli Management Framework
SYSTEMS AFFECTED
Tivoli Management Framework
PROBLEM
Duct Tape posted following. After conducting the penetration
testing, he was able to gain full access to other machines
inside a customer's dmz network because of Tivoli.
Cisco PIX firewall protecting a set of Internet Web and database
servers from the Internet in a dmz. The PIX also protected the
internal machines from the Internet. The machines in the dmz
were both NT and Unix. The internal network had a Tivoli
management station which monitored the dmz machines and internal
machines.
He was able to break into an IIS server that hadn't been patched
for the CGI decode vulnerability. With this vulnerability he
could upload an exec program on Windows where he could spoof the
name and IP address of the sending machine. With this tool he
could send commands to all other Unix machines in the same dmz
that would be executed under the permissions of the Tivoli
management station.
Tivoli requires Rexec (port 512) to run on their managed hosts.
When these hosts are connected to the Internet, there is a huge
risk Tivoli will allow full access to all machines in your DMZ.
SOLUTION
Tivoli requires rexec during the initial install of the framework
only. For the brief time it takes to install this (single time
operation) one can disallow Internet connectivity. What happens
is that individuals who install Tivoli sometimes forget to stop
the service once the framework is installed, and/or forget to
re-edit inetd.conf, so... the next time the system is restarted...