From researchteam5@esecurityonline.com Fri May 3 03:38:10 2002 From: researchteam5@esecurityonline.com To: vulnwatch@vulnwatch.org, bugtraq@securityfocus.com Cc: ken.williams@ey.com Date: Mon, 29 Apr 2002 16:12:30 -0500 Subject: eSecurityOnline Security Advisory 4198 - Sun Solaris cachefsd mou nt file buffer overflow vulnerability eSO Security Advisory: 4198 Discovery Date: October 29, 2001 ID: eSO:4198 Title: Sun Solaris cachefsd mount file buffer overflow vulnerability Impact: Local attackers can gain root privileges Affected Technology: Solaris 2.6, 7, 8 SPARC and x86 Vendor Status: Vendor notified Discovered By: Kevin Kotas of the eSecurityOnline Research and Development Team Technical Contributor: Richard Johnson of the eSecurityOnline Research and Development Team CVE Reference: CAN-2002-0084 Advisory Location: http://www.eSecurityOnline.com/advisories/eSO4198.asp Description: Sun Solaris cachefsd is vulnerable to a flaw that can allow attackers to execute arbitrary code. The problem is due to insufficient bounds checking on mounts that are supplied by a user. An attacker can create a file and have cachefsd process it to gain root privileges. Technical Recommendation: As a workaround solution, ensure RPC services are blocked at the firewall. Otherwise, disable cachefsd. Copyright 2002 eSecurityOnline LLC. All rights reserved. THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND, AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE, CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN THIS VULNERABILITY ALERT.