Risks
Vulnerabilities
Browse by
Sun Solaris admintool media installation path buffer overflow vulnerability
30 April 2002
Bookmark and Share
eSO Security Advisory: 4123
Discovery Date: October 15, 2001
ID: eSO:4123
Title: Sun Solaris admintool media installation path buffer overflow vulnerability
Impact: Local attackers can gain root privileges
Affected Technology: Sun Solaris 2.6,7,8 SPARC and x86
Vendor Status: Vendor notified
Discovered By: Kevin Kotas of the eSecurityOnline Research and Development Team
CVE Reference: CAN-2002-0088

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO4123.asp

Description:
Sun Solaris admintool is vulnerable to a buffer overflow condition that allows a local attacker to gain root privileges. The problem is due to insufficient bounds checking on the installation path. An attacker can create a path, supply it to admintool, and execute arbitrary code.

Technical Recommendation:
As a workaround solution, remove the setuid bit from the binary.

chmod -s /usr/bin/admintool

Copyright 2002 eSecurityOnline LLC. All rights reserved.

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND, AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE, CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN THIS VULNERABILITY ALERT.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //