BugTraq
Solaris ld.so.1 buffer overflow Jul 29 2003 08:36PM
Jouko Pynnonen (jouko iki fi) (2 replies)
Re: Solaris ld.so.1 buffer overflow Aug 01 2003 08:58PM
Crist J. Clark (cristjc comcast net)
On Tue, Jul 29, 2003 at 11:36:18PM +0300, Jouko Pynnonen wrote:
>
> OVERVIEW
> ========
>
> There is a buffer overflow vulnerability in the Solaris runtime linker,
> /lib/ld.so.1. A local user can gain elevated privileges if there are
> any dynamically linked, executable SUID/SGID programs in the
> filesystem.
[snip]

According to the Sun Alert on this vulnerability,

http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55680

Various patchlevels of Solaris 2.6, 7, 8, and 9 sparc and i386 are all
vulnerable.

On Solaris 2.5.1,

$ uname -a
SunOS wallace 5.5.1 Generic_103640-40 sun4u sparc SUNW,Ultra-Enterprise

When I try the simple,

$ LD_PRELOAD=/`perl -e 'print "A"x2000'`/ passwd
passwd: Changing password for cclark
Enter login(NIS) password:

It doesn't crash. That reassures me somewhat, but does anyone know if
2.5.1 is not listed because it is (a) no longer supported and not
tested and patched, or (b) not actually vulnerable?

Thanks.
--
Crist J. Clark | cjclark (at) alum.mit (dot) edu [email concealed]
| cjclark (at) jhu (dot) edu [email concealed]
http://people.freebsd.org/~cjc/ | cjc (at) freebsd (dot) org [email concealed]

[ reply ]
RE: Solaris ld.so.1 buffer overflow Jul 30 2003 02:28PM
clint walker (cwalker gnx com)


 

Privacy Statement
Copyright 2010, SecurityFocus