Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: Solaris ld.so.1 buffer overflow
From: "Crist J. Clark" <cristjc () comcast net>
Date: Fri, 1 Aug 2003 13:58:48 -0700

On Tue, Jul 29, 2003 at 11:36:18PM +0300, Jouko Pynnonen wrote:

OVERVIEW
========

There is a buffer overflow vulnerability in the Solaris runtime linker, 
/lib/ld.so.1. A local user can gain elevated privileges if there are
any dynamically linked, executable SUID/SGID programs in the 
filesystem.
[snip]

According to the Sun Alert on this vulnerability,

  http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/55680

Various patchlevels of Solaris 2.6, 7, 8, and 9 sparc and i386 are all
vulnerable.

On Solaris 2.5.1,

  $ uname -a  
  SunOS wallace 5.5.1 Generic_103640-40 sun4u sparc SUNW,Ultra-Enterprise

When I try the simple,

  $ LD_PRELOAD=/`perl -e 'print "A"x2000'`/ passwd
  passwd:  Changing password for cclark
  Enter login(NIS) password:

It doesn't crash. That reassures me somewhat, but does anyone know if
2.5.1 is not listed because it is (a) no longer supported and not
tested and patched, or (b) not actually vulnerable?

Thanks.
-- 
Crist J. Clark                     |     cjclark () alum mit edu
                                   |     cjclark () jhu edu
http://people.freebsd.org/~cjc/    |     cjc () freebsd org


  By Date           By Thread  

Current thread:
  • Re: Solaris ld.so.1 buffer overflow Crist J. Clark (Aug 04)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]