what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

eSO-4123.txt

eSO-4123.txt
Posted May 1, 2002
Authored by Kevin Kotas, eSO | Site eSecurityOnline.com

eSO Security Advisory 4123 - Sun Solaris admintool is vulnerable to a buffer overflow condition that allows local attackers to gain root privileges. The problem resides in the installation path parsing mechanism of this application and affects Sun Solaris 2.6,7,8 (SPARC and x86).

tags | overflow, x86, local, root
systems | solaris
SHA-256 | 93be0f80fb741c0e1169bc66b5b5364a68bda01eddbf530c46a15149aac47bec

eSO-4123.txt

Change Mirror Download
eSO Security Advisory: 4123 
Discovery Date: October 15, 2001
ID: eSO:4123
Title: Sun Solaris admintool media installation path
buffer overflow vulnerability
Impact: Local attackers can gain root privileges
Affected Technology: Sun Solaris 2.6,7,8 SPARC and x86
Vendor Status: Vendor notified
Discovered By: Kevin Kotas of the eSecurityOnline Research
and Development Team
CVE Reference: CAN-2002-0088

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO4123.asp

Description:
Sun Solaris admintool is vulnerable to a buffer overflow condition
that allows a local attacker to gain root privileges. The problem is
due to insufficient bounds checking on the installation path. An
attacker can create a path, supply it to admintool, and execute
arbitrary code.

Technical Recommendation:
As a workaround solution, remove the setuid bit from the binary.

chmod -s /usr/bin/admintool

Copyright 2002 eSecurityOnline LLC. All rights reserved.

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY
ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close