<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISS sysscan in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709824#M757293</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The following link explains how shmget() sets the permissions via the shmflg parameter:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.ecst.csuchico.edu/~beej/guide/ipc/shmem.html" target="_blank"&gt;http://www.ecst.csuchico.edu/~beej/guide/ipc/shmem.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Extracted here for your convenience:&lt;BR /&gt;&lt;BR /&gt;Creating the segment and connecting&lt;BR /&gt;Similarly to other forms of System V IPC, a shared memory segment is created and connected to via the shmget() call: &lt;BR /&gt;&lt;BR /&gt;    int shmget(key_t key, size_t size, int shmflg);&lt;BR /&gt;&lt;BR /&gt;Upon successful completion, shmget() returns an identifier for the shared memory segment. The key argument should be created the same was as shown in the Message Queues document, using ftok(). The next argument, size, is the size in bytes of the shared memory segment. Finally, the shmflg should be set to the permissions of the segment bitwise-ORd with IPC_CREAT if you want to create the segment, but can be 0 otherwise. (It doesn't hurt to specify IPC_CREAT every time--it will simply connect you if the segment already exists.) &lt;BR /&gt;&lt;BR /&gt;It is an internal system call that you might have to deal with specifically in your database application. I am not aware of any OS command that can manipulate the permissions of a shared memory segment, semaphore or message queue.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
    <pubDate>Wed, 24 Apr 2002 09:00:34 GMT</pubDate>
    <dc:creator>Steven Sim Kok Leong</dc:creator>
    <dc:date>2002-04-24T09:00:34Z</dc:date>
    <item>
      <title>ISS sysscan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709823#M757292</link>
      <description>Hi, ISS security scanner gives the 3 following advises. Does anyone know what they mean.  if  it really are security breaches, and last but not least how to solve them???&lt;BR /&gt;Thanks in Advance,&lt;BR /&gt;Donald&lt;BR /&gt;&lt;BR /&gt;Check&lt;BR /&gt;Risk level&lt;BR /&gt;Brief description&lt;BR /&gt;&lt;BR /&gt;ipcs-msg&lt;BR /&gt;Medium&lt;BR /&gt;Message queue grants world read/write permissions&lt;BR /&gt;&lt;BR /&gt;Description Message queues allow co-operating processes to communicate. If a message queue permits uncontrolled reading and/or writing, then unauthorized users may be able to read data and disrupt or manipulate processes using the shared memory.&lt;BR /&gt;&lt;BR /&gt;Consequences Unauthorized users may be able to access the shared memory.&lt;BR /&gt;&lt;BR /&gt;Remedy Amend the access granted to be only to the users/groups of the processes using the message queue.&lt;BR /&gt;&lt;BR /&gt;Vulnerability detail&lt;BR /&gt;&lt;BR /&gt;  Output from '/usr/bin/ipcs -q':&lt;BR /&gt;T      ID     KEY        MODE        OWNER     GROUP&lt;BR /&gt;q       0 0x3c1c0465 -Rrw--w--w-      root      root&lt;BR /&gt;q       1 0x3e1c0465 --rw-r--r--      root      root&lt;BR /&gt;&lt;BR /&gt;Check&lt;BR /&gt;Risk level&lt;BR /&gt;Brief description&lt;BR /&gt;&lt;BR /&gt;ipcs-sem&lt;BR /&gt;Medium&lt;BR /&gt;Semaphore grants world alter permissions&lt;BR /&gt;&lt;BR /&gt;Description Semaphores are used to control access to shared memory segments. If a semaphore permits uncontrolled alteration, then unauthorized users may be able to disrupt or manipulate processes using the shared memory. This check determines if a semaphore grants 'alter' permission to all users.&lt;BR /&gt;&lt;BR /&gt;Consequences Unauthorized users may be able to disrupt or manipulate processes using the shared memory.&lt;BR /&gt;&lt;BR /&gt;Remedy Change the access so that it is only granted to the users/groups of the processes using the shared memory segment controlled by the semaphore.&lt;BR /&gt;&lt;BR /&gt;Vulnerability detail&lt;BR /&gt;&lt;BR /&gt;  Output from '/usr/bin/ipcs -s':&lt;BR /&gt;T      ID     KEY        MODE        OWNER     GROUP&lt;BR /&gt;s       0 0x411c0611 --ra-ra-ra-      root      root&lt;BR /&gt;s       1 0x4e0c0002 --ra-ra-ra-      root      root&lt;BR /&gt;s       2 0x412003c0 --ra-ra-ra-      root      root&lt;BR /&gt;s       6 0x61200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s       7 0x73200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s       8 0x70200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s       9 0x69200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      10 0x75200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      11 0x63200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      12 0x64200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      13 0x66200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      14 0x6c200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      15 0x6d200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      16 0x6f200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      18 0x73181009 --ra-ra-ra-      root      root&lt;BR /&gt;s      20 0x410c09c1 --ra-ra-ra-      root      root&lt;BR /&gt;s      22 0x52200cbf --ra-ra-ra-      root      root&lt;BR /&gt;s      23 0x00280269 --ra-ra-ra-      root      root&lt;BR /&gt;&lt;BR /&gt;Check&lt;BR /&gt;Risk level&lt;BR /&gt;Brief description&lt;BR /&gt;&lt;BR /&gt;ipcs-shm&lt;BR /&gt;Medium&lt;BR /&gt;Shared memory segment grants world read/write permissions&lt;BR /&gt;&lt;BR /&gt;Description Shared memory segments allow co-operating processes to communicate. If a memory segment permits uncontrolled reading and/or writing, then unauthorized users may be able to read data and disrupt or manipulate processes using the shared memory. This check determines if the shared memory segment grants read or write permissions to all users.&lt;BR /&gt;&lt;BR /&gt;Consequences Unauthorized users may be able to read data, disrupt, or manipulate processes using the shared memory.&lt;BR /&gt;&lt;BR /&gt;Remedy Access should only be granted to the users/groups of the processes using the shared memory segment.&lt;BR /&gt;&lt;BR /&gt;Vulnerability detail&lt;BR /&gt;&lt;BR /&gt;  Output from '/usr/bin/ipcs -m':&lt;BR /&gt;T      ID     KEY        MODE        OWNER     GROUP&lt;BR /&gt;m       0 0x411c0611 --rw-rw-rw-      root      root&lt;BR /&gt;m       1 0x4e0c0002 --rw-rw-rw-      root      root&lt;BR /&gt;m       2 0x412003c0 --rw-rw-rw-      root      root&lt;BR /&gt;m       4 0x06347849 --rw-rw-rw-      root      root&lt;BR /&gt;m     405 0xffffffff --rw-r--rw-      root      root&lt;BR /&gt;m       7 0x6d181009 --rw-rw-rw-      root      root&lt;BR /&gt;m    2414 0x00280267 --rw-r--r--      root      root</description>
      <pubDate>Wed, 24 Apr 2002 08:31:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709823#M757292</guid>
      <dc:creator>Donald Kok</dc:creator>
      <dc:date>2002-04-24T08:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISS sysscan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709824#M757293</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;The following link explains how shmget() sets the permissions via the shmflg parameter:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.ecst.csuchico.edu/~beej/guide/ipc/shmem.html" target="_blank"&gt;http://www.ecst.csuchico.edu/~beej/guide/ipc/shmem.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Extracted here for your convenience:&lt;BR /&gt;&lt;BR /&gt;Creating the segment and connecting&lt;BR /&gt;Similarly to other forms of System V IPC, a shared memory segment is created and connected to via the shmget() call: &lt;BR /&gt;&lt;BR /&gt;    int shmget(key_t key, size_t size, int shmflg);&lt;BR /&gt;&lt;BR /&gt;Upon successful completion, shmget() returns an identifier for the shared memory segment. The key argument should be created the same was as shown in the Message Queues document, using ftok(). The next argument, size, is the size in bytes of the shared memory segment. Finally, the shmflg should be set to the permissions of the segment bitwise-ORd with IPC_CREAT if you want to create the segment, but can be 0 otherwise. (It doesn't hurt to specify IPC_CREAT every time--it will simply connect you if the segment already exists.) &lt;BR /&gt;&lt;BR /&gt;It is an internal system call that you might have to deal with specifically in your database application. I am not aware of any OS command that can manipulate the permissions of a shared memory segment, semaphore or message queue.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Wed, 24 Apr 2002 09:00:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709824#M757293</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-04-24T09:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISS sysscan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709825#M757294</link>
      <description>----&lt;BR /&gt;Hi, ISS security scanner gives the 3 following advises. Does anyone know what they mean. if it really are security breaches, and last but not least how to solve them??? &lt;BR /&gt;----&lt;BR /&gt;&lt;BR /&gt;1) They mean that local processes might be able to write to the shared memory/message queue areas.  Remote processes cannot.&lt;BR /&gt;&lt;BR /&gt;2) They are not security breaches.&lt;BR /&gt;&lt;BR /&gt;3) You can solve them by contacting HP to have them change the internal applications using those shared resources.&lt;BR /&gt;&lt;BR /&gt;What people do in practice:&lt;BR /&gt;&lt;BR /&gt;4) Realize that ISS is going to be overly verbose in its error checking, and ignore the messages.&lt;BR /&gt;&lt;BR /&gt;In fact, if these are the only warnings ISS generates on your system, you're doing very well at securing them!  (Or someone has already gone through and suppressed all the other "false" messages ISS coughs up.)&lt;BR /&gt;&lt;BR /&gt;  -- Steve&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Apr 2002 22:46:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709825#M757294</guid>
      <dc:creator>Steve Bonds</dc:creator>
      <dc:date>2002-04-25T22:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISS sysscan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709826#M757295</link>
      <description>Hi Steve,&lt;BR /&gt;&lt;BR /&gt;thanks for the reply. The 3 messages are definitive NOT the only messages from ISS. They are the only ones i did not have clue what ISS meant.&lt;BR /&gt;&lt;BR /&gt;I think I leave it like it is.&lt;BR /&gt;&lt;BR /&gt;Greetzz&lt;BR /&gt;Donald&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Apr 2002 05:48:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709826#M757295</guid>
      <dc:creator>Donald Kok</dc:creator>
      <dc:date>2002-04-26T05:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISS sysscan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709827#M757296</link>
      <description>By the way, &lt;BR /&gt;does the messages have anything to do with a danger for rootkits? The other day I read about rootkits that can write directly to /dev/kmem.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 26 Apr 2002 06:53:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/iss-sysscan/m-p/2709827#M757296</guid>
      <dc:creator>Donald Kok</dc:creator>
      <dc:date>2002-04-26T06:53:38Z</dc:date>
    </item>
  </channel>
</rss>

