exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

AA-96.09.HP.sysdiag.vul

AA-96.09.HP.sysdiag.vul
Posted Sep 23, 1999

AA-96.09.HP.sysdiag.vul

SHA-256 | 88bb2221cf742e707651022244f9d8d6f9bc9291bc995d54a5a6f93f146cad5e

AA-96.09.HP.sysdiag.vul

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
AA-96.09 AUSCERT Advisory
HP-UX SYSDIAG Online Diagnostics Subsystem Vulnerability
12 November 1996

Last Revised: --

- ---------------------------------------------------------------------------

AUSCERT has received information that there is a vulnerability in the
SYSDIAG Online Diagnostics Subsystem supplied by Hewlett Packard. This
vulnerability is present under both HP-UX 9.x and 10.x

This vulnerability may allow local users to gain root privileges.

Exploit details involving this vulnerability have been widely distributed.

Official patches may be released by Hewlett Packard to address this
vulnerability in the future. Until patches are made available, AUSCERT
recommends that sites take the actions suggested in Section 3.1.

This advisory will be updated when vendor patches are made available.

- ---------------------------------------------------------------------------

1. Description

The HP SYSDIAG Online Diagnostics Subsystem enables users to run
online diagnostic programs to diagnose suspected system hardware
problems.

Some programs supplied with the SYSDIAG package create files in
an insecure manner. As these programs execute with root
privileges, it is possible to create arbitrary files on the system.

The SYSDIAG subsystem may be installed under both HP-UX 9.x and 10.x.
The default location of the programs used by the SYSDIAG package
differs between the 9.x and 10.x releases of the operating system.

To determine if the SYSDIAG programs are installed, sites should check
for the presence of the program "sysdiag".

Under HP-UX 9.x:

% ls -l /bin/sysdiag

Under HP-UX 10.x:

% ls -l /usr/sbin/sysdiag

Individual sites are encouraged to check their systems for the SYSDIAG
package, and if installed, take the actions recommended in Section 3.

2. Impact

Local users may be able to create arbitrary files on the system. This
may be leveraged to gain root privileges.

3. Workarounds/Solution

AUSCERT recommends that sites prevent the possible exploitation of
this vulnerability by immediately applying the workaround given in
Section 3.1.

Currently there are no vendor patches available that address this
vulnerability. AUSCERT recommends that official vendor patches be
installed when they are made available.

3.1 Remove setuid permissions

Until official vendor patches are made available, sites should
remove the setuid root permissions from the vulnerable programs. To
do this, the following commands should be run as root:

Under HP-UX 9.x

# chmod u-s /bin/sysdiag
# chmod u-s /usr/diag/bin/*

Under HP-UX 10.x

# chmod u-s /usr/sbin/sysdiag
# chmod u-s /usr/sbin/diag/*

Note that this will restrict non-root users from using the SYSDIAG
subsystem diagnostic tools.

When using any of the SYSDIAG subsystem programs as root, system
administrators should ensure that they do not use the "outfile"
sub-command to write files in world writable directories. Writing
files in such directories may leave the system open to exploitation
of this vulnerability.

- ---------------------------------------------------------------------------
AUSCERT thanks Hewlett-Packard for their continued assistance and technical
expertise essential for the production of this advisory. Thanks also to
Viviani Paz (The University of Queensland) for her assistance in this
matter.
- ---------------------------------------------------------------------------

The AUSCERT team have made every effort to ensure that the information
contained in this document is accurate. However, the decision to use the
information described is the responsibility of each user or organisation.
The appropriateness of this document for an organisation or individual
system should be considered before application in conjunction with local
policies and procedures. AUSCERT takes no responsibility for the
consequences of applying the contents of this document.

If you believe that your system has been compromised, contact AUSCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

AUSCERT is located at The University of Queensland within the Prentice
Centre. AUSCERT is a full member of the Forum of Incident Response and
Security Teams (FIRST).

AUSCERT maintains an anonymous FTP service which is found on:
ftp://ftp.auscert.org.au/pub/. This archive contains past SERT and AUSCERT
Advisories, and other computer security information.

AUSCERT also maintains a World Wide Web service which is found on:
http://www.auscert.org.au/.

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 4477
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AUSCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.

Postal:
Australian Computer Emergency Response Team
c/- Prentice Centre
The University of Queensland
Brisbane
Qld. 4072.
AUSTRALIA


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision History


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBMohljih9+71yA2DNAQEY/wP+NyRvPnVOuP4aR7pQKaGKuhqGRIx7fya7
+DAEQ7xwD4Bc0uaKUnkj58fOBSmTh8BBqSFZMASKw8dh0BFIf+166kSKw1S6bJhk
fvlWacxFWkxgM4SWnEszVW+jGrfXrTwkE2xtW3mpDN4EKvC4K6VTH4QdF2/4lK0t
6SdIb+Rm7iA=
=yMkL
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close