[8lgm]-Advisory-23.UNIX.SunOS-loadmodule.2-Jan-1995

PROGRAM:

/usr/lib/loadmodule

VULNERABLE VERSIONS:

SunOS 4.1.* & Openwindows 3 with latest loadmodule patch.

DESCRIPTION:

loadmodule uses system(3) to find the architecture of the machine.

IMPACT:

Local users can obtain root access.

REPEAT BY:

A program to exploit this vulnerability is available as of now. This program has been tested with the latest Sun patch. To obtain this program, send mail to 8lgm-fileserver@8lgm.org, with a line in the body of the message containing:-

SEND load.root

DISCUSSION:

Using system(3) in setuid programs is bad practice. Sun's patch attempted to make this safe by reseting IFS before the call. Unfortunately, the patch does not do a thorough enough job.

FIX:

Contact vendor for fix.

STATUS UPDATE:

The file:

[8lgm]-Advisory-23.UNIX.SunOS-loadmodule.2-Jan-1995.README

will be created on www.8lgm.org. This will contain updates on any further versions which are found to be vulnerable, and any other information received pertaining to this advisory.


FEEDBACK AND CONTACT INFORMATION:

        majordomo@8lgm.org      (Mailing list requests - try 'help'
                                 for details)

8lgm@8lgm.org (Everything else)

8LGM FILESERVER:

All [8LGM] advisories may be obtained via the [8LGM] fileserver. For details, 'echo help | mail 8lgm-fileserver@8lgm.org'

8LGM WWW SERVER:

[8LGM]'s web server can be reached at http://www.8lgm.org. This contains details of all 8LGM advisories and other useful information.