eSO Security Advisory 4123 - Sun Solaris admintool is vulnerable to a buffer overflow condition that allows local attackers to gain root privileges. The problem resides in the installation path parsing mechanism of this application and affects Sun Solaris 2.6,7,8 (SPARC and x86).
93be0f80fb741c0e1169bc66b5b5364a68bda01eddbf530c46a15149aac47bec
eSO Security Advisory: 4123
Discovery Date: October 15, 2001
ID: eSO:4123
Title: Sun Solaris admintool media installation path
buffer overflow vulnerability
Impact: Local attackers can gain root privileges
Affected Technology: Sun Solaris 2.6,7,8 SPARC and x86
Vendor Status: Vendor notified
Discovered By: Kevin Kotas of the eSecurityOnline Research
and Development Team
CVE Reference: CAN-2002-0088
Advisory Location:
https://www.eSecurityOnline.com/advisories/eSO4123.asp
Description:
Sun Solaris admintool is vulnerable to a buffer overflow condition
that allows a local attacker to gain root privileges. The problem is
due to insufficient bounds checking on the installation path. An
attacker can create a path, supply it to admintool, and execute
arbitrary code.
Technical Recommendation:
As a workaround solution, remove the setuid bit from the binary.
chmod -s /usr/bin/admintool
Copyright 2002 eSecurityOnline LLC. All rights reserved.
THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY
ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.