exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eSO-2397.txt

eSO-2397.txt
Posted May 1, 2002
Authored by Kevin Kotas | Site eSecurityOnline.com

eSO Security Advisory 2397 - The Sun Solaris admintool utility is vulnerable to multiple buffer overflow conditions that allow a local attacker to gain root access. The first overflow exists in the parsing mechanism of the .cdtoc file and the second overflow can be triggered trough the '-d' parameter that is given to this program upon execution.

tags | overflow, local, root
systems | solaris
SHA-256 | 46f8320fbeb6bec2c90998056a30257667fbabd667769dc75ea9f320ef7c4a4c

eSO-2397.txt

Change Mirror Download
eSO Security Advisory: 2397 
Discovery Date: March 28, 2000
ID: eSO:2397
Title: Sun Solaris admintool -d and PRODVERS buffer
overflow vulnerabilities
Impact: Local attackers can gain root privileges
Affected Technology: Solaris 2.5, 2.5.1, 2.6, 7, 8 SPARC and x86
Vendor Status: Patches are available
Discovered By: Kevin Kotas of the eSecurityOnline Research
and Development Team
CVE Reference: CAN-2002-0089

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO2397.asp

Description:
The Sun Solaris admintool utility is vulnerable to multiple buffer
overflow conditions that allow a local attacker to gain root access.
The problems are due to insufficient bounds checking on command line
options and on a configuration file variable. An attacker can use a
carefully constructed string with the -d command line option or with
the PRODVERS .cdtoc file variable to gain root privileges.

The first buffer overflow is related to command line execution of
admintool with the -d switch, when a long string is used with
"/Solaris" present.

The second buffer overflow occurs due to a lack of bounds checking
for the PRODVERS argument in the .cdtoc file. The .cdtoc file is used
to specify variables for installation media. Through the
software/edit/add feature, a local directory can be specified that
contains a .cdtoc file. The file can contain a string of data for
the PRODVERS variable that will cause the program to crash or execute
code when processed.

Technical Recommendation:
Apply the following patches.

Solaris 2.5:
103247-16

Solaris 2.5_x86:
103245-16

Solaris 2.5.1:
103558-16

Solaris 2.5.1_x86:
103559-16

Solaris 2.6:
105800-07

Solaris 2.6_x86:
105801-07

Solaris 7:
108721-02

Solaris 7_x86:
108722-02

Solaris 8:
10453-01

Solaris 8_x86:
110454-01

As a workaround solution, remove the setuid permissions with the following:
chmod -s /usr/bin/admintool

Vendor site:
http://sunsolve.sun.com

Acknowledgements:
eSecurityOnline would like to thank Sun Microsystems and the Sun security
team for their cooperation in resolving the issue.

Copyright 2002 eSecurityOnline LLC. All rights reserved.

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY
ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close