/usr/lib/loadmodule
SunOS 4.1.* & Openwindows 3 with latest loadmodule patch.
loadmodule uses system(3)
to find the architecture of
the machine.
Local users can obtain root access.
A program to exploit this vulnerability is available as of now. This program has been tested with the latest Sun patch. To obtain this program, send mail to 8lgm-fileserver@8lgm.org, with a line in the body of the message containing:-
SEND load.root
Using system(3)
in setuid programs is bad practice. Sun's patch
attempted to make this safe by reseting IFS before the call.
Unfortunately, the patch does not do a thorough enough job.
Contact vendor for fix.
The file:
[8lgm]-Advisory-23.UNIX.SunOS-loadmodule.2-Jan-1995.README
will be created on www.8lgm.org. This will contain updates on any further versions which are found to be vulnerable, and any other information received pertaining to this advisory.
majordomo@8lgm.org (Mailing list requests - try 'help' for details)8lgm@8lgm.org (Everything else)
All [8LGM] advisories may be obtained via the [8LGM] fileserver.
For details, 'echo help | mail 8lgm-fileserver@8lgm.org
'
[8LGM]'s web server can be reached at http://www.8lgm.org. This contains details of all 8LGM advisories and other useful information.