SAS SASTCPD Command Line Argument Buffer Overflow Vulnerability

sastcpd is a "Job Spawner" included with the base installation of the SAS Software infrastructure. It is available for various platforms. This issue affects systems running the Unix, Linux, and Microsoft operating systems.

A problem has been discovered in the sastcpd program. sastcpd is a job spawning program included with the SAS Base product. By default, it is installed setuid root. When sastcpd is executed with a command line argument of 1200 characters, a buffer overflow occurs. This overflow can result in the overwriting of stack variables, including the return address, and the execution of arbitrary code. As the sastcpd program is installed setuid root, the code will be executed with administrative privileges.


 

Privacy Statement
Copyright 2010, SecurityFocus