exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Next Generation Security Advisory 2002.3

Next Generation Security Advisory 2002.3
Posted May 24, 2002
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2002-3 - Sun Solaris in.talkd is vulnerable to a remote root format string bug. An attacker can request a talk session with a especially crafted user field able to write memory and gain control of the flow of the in.talkd.

tags | remote, root
systems | solaris
SHA-256 | 7fa8d1d538e9e06e7e46c09cb39e2c8630bd909c9fbb9f637606a8b0e9b96d44

Next Generation Security Advisory 2002.3

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Next Generation Security Technologies
http://www.ngsec.com
Security Advisory


Title: Solaris in.talkd, remote root compromise
ID: NGSEC-2002-3
Application: in.talkd on Solaris 9ea or older (http://www.sun.com)
Date: 23/05/2002
Status: Due to parallel release of bug, vendor not contacted.
Platform: Solaris
Author: Fermín J. Serna <fjserna@ngsec.com>
Location: http://www.ngsec.com/docs/advisories/NGSEC-2002-3.txt


Overview:
- ---------

Sun Solaris in.talkd is vulnerable to a format string bug which can be
exploited remotely. An attacker can request a talk session with a
especially crafted luser field able to write memory and gain control of
the flow of the in.talkd.

This vulnerability can also be exploited with the field clt_addr and its
resolved name (in conjuction with a DNS).

GOBBLES discovered this bug (Who was first? ;), and reported this to
bugtraq. They did not say solaris was vulnerable.


Technical description:
- ----------------------

Sun Solaris in.talkd is a daemon installed and enabled by default on all
Solaris 2.* systems. This daemon contains a format string bug in the
following line at in.talkd/announce.c

print_mesg(FILE *tf, CTL_MSG *request, char *remote_machine) {
...
fprintf(tf, big_buf);
...
}

in.talkd calls print mesg from:

main()->process_request()->do_announce()->announce()->announce_proc()->print_mesg()

This code lacks of format string. Since "big_buf" contains some user supplied
data such as luser, an attacker can query in.talkd server with a luser
field containing a malign format string (%n).

NGSEC has developed an exploit for this vulnerability but we are not going
to release it for obvious reasons (remote root compromise to a widely
spread application).


Proof of vulnerability:
- -----------------------

On the attacker machine:

piscis:~/lots-of-0days/sun-talkd# rusers -l ultra
root ultra:pts/0 May 15 14:56 :01 (piscis)
piscis:~/lots-of-0days/sun-talkd# ./talkd-x --test "%#x %#x" ultra root
Solaris (up to 9ea) in.talkd xploit by Fermín J. Serna <fjserna@ngsec.com>
Next Generation Security Technologies
http://www.ngsec.com

Entering test mode
Talk request from "%#x %#x:127.0.0.1" to "root:ultra" sent!.
piscis:~/lots-of-0days/sun-talkd#


On the solaris machine:

ultra:/# uname -a
SunOS ultra 5.7 Generic_106541-19 sun4u sparc SUNW,Ultra-5_10
ultra:/#

Message from Talk_Daemon@ultra at 15:01 ...
talk: connection requested by 0xa 0x14@localhost.
talk: respond with: talk 0x5 0xffbef980@localhost

ultra:/#


Recommendations:
- ----------------
Chmod 000 in.talkd and wait for sun's patch.


More security advisories at: http://www.ngsec.com/ngresearch/ngadvisories/
PGP Key: http://www.ngsec.com/pgp/labs.asc

(c)Copyright 2002 NGSEC. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iD8DBQE87TttKrwoKcQl8Y4RAi1kAKCanR2fXScZcX96clTjoZk9aKUv4gCfWinP
rG5Yo9qa5vF+kFFUrQu1FUs=
=7OXi
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close