Rarpd is a reverse arp protocol for small to medium sized networks. The solaris implementation (in.rarpd) contains 3 remotely exploitable buffer overflows, 2 locally exploitable, and 2 cases of format string exploitability.
6012d6c0831d4d98d3a886dd7b90613b1a149d31b15c57e57b27be57f8d13530
Intro:
rarpd is a reverse arp protocol for small to medium sized networks.
in the solaris implementation (in.rarpd) there seems to be 3 remotely
exploitable buffer overflows, 2 locally exploitable and 2 cases of format
string exploitability.
Details:
In the functions error and syserr (syserr also being used by other in.*
implmentations which are also exploitable, but not the topic of this
advisory today) there contains 2 common syslog calls without format strings.
static void
syserr(s)
char *s;
{
char buf[256];
(void) sprintf(buf, "%s: %s", s, strerror(errno));
(void) fprintf(stderr, "%s: %s\n", cmdname, buf);
syslog(LOG_ERR, buf);
exit(1);
}
/* VARARGS1 */
static void
error(char *fmt, ...)
{
char buf[256];
va_list ap;
va_start(ap, fmt);
(void) vsprintf(buf, fmt, ap);
va_end(ap);
(void) fprintf(stderr, "%s: %s\n", cmdname, buf);
syslog(LOG_ERR, buf);
exit(1);
}
there are two vulnerable calls which could be exploited locally or remotely.
vendor notification: nope
a working exploit has been created for the remote buffer overflows but not
this time, not here.
DER systems
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.