exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eSO-4123.txt

eSO-4123.txt
Posted May 1, 2002
Authored by Kevin Kotas, eSO | Site eSecurityOnline.com

eSO Security Advisory 4123 - Sun Solaris admintool is vulnerable to a buffer overflow condition that allows local attackers to gain root privileges. The problem resides in the installation path parsing mechanism of this application and affects Sun Solaris 2.6,7,8 (SPARC and x86).

tags | overflow, x86, local, root
systems | solaris
SHA-256 | 93be0f80fb741c0e1169bc66b5b5364a68bda01eddbf530c46a15149aac47bec

eSO-4123.txt

Change Mirror Download
eSO Security Advisory: 4123 
Discovery Date: October 15, 2001
ID: eSO:4123
Title: Sun Solaris admintool media installation path
buffer overflow vulnerability
Impact: Local attackers can gain root privileges
Affected Technology: Sun Solaris 2.6,7,8 SPARC and x86
Vendor Status: Vendor notified
Discovered By: Kevin Kotas of the eSecurityOnline Research
and Development Team
CVE Reference: CAN-2002-0088

Advisory Location:
https://www.eSecurityOnline.com/advisories/eSO4123.asp

Description:
Sun Solaris admintool is vulnerable to a buffer overflow condition
that allows a local attacker to gain root privileges. The problem is
due to insufficient bounds checking on the installation path. An
attacker can create a path, supply it to admintool, and execute
arbitrary code.

Technical Recommendation:
As a workaround solution, remove the setuid bit from the binary.

chmod -s /usr/bin/admintool

Copyright 2002 eSecurityOnline LLC. All rights reserved.

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY
ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close