From researchteam5@esecurityonline.com Fri May 3 03:38:24 2002 From: researchteam5@esecurityonline.com To: vulnwatch@vulnwatch.org, bugtraq@securityfocus.com Cc: ken.williams@ey.com Date: Mon, 29 Apr 2002 15:57:30 -0500 Subject: eSecurityOnline Security Advisory 4123 - Sun Solaris admintool me dia installation path buffer overflow vulnerability eSO Security Advisory: 4123 Discovery Date: October 15, 2001 ID: eSO:4123 Title: Sun Solaris admintool media installation path buffer overflow vulnerability Impact: Local attackers can gain root privileges Affected Technology: Sun Solaris 2.6,7,8 SPARC and x86 Vendor Status: Vendor notified Discovered By: Kevin Kotas of the eSecurityOnline Research and Development Team CVE Reference: CAN-2002-0088 Advisory Location: http://www.eSecurityOnline.com/advisories/eSO4123.asp Description: Sun Solaris admintool is vulnerable to a buffer overflow condition that allows a local attacker to gain root privileges. The problem is due to insufficient bounds checking on the installation path. An attacker can create a path, supply it to admintool, and execute arbitrary code. Technical Recommendation: As a workaround solution, remove the setuid bit from the binary. chmod -s /usr/bin/admintool Copyright 2002 eSecurityOnline LLC. All rights reserved. THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND, AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE, CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN THIS VULNERABILITY ALERT.