---------------------------------------------------------------------- SNS Advisory No.50 Compaq Tru64 UNIX dtprintinfo "-session" Buffer Overflow Vulnerability Problem first discovered: Wed, 10 Oct 2001 Published: Thu, 17 Apr 2002 ---------------------------------------------------------------------- Overview: --------- dtprintinfo included with Compaq Tru64 UNIX contains a buffer overflow vulnerability, which could potentially allow local attackers to elevate privileges. Problem Description: -------------------- The /usr/dt/bin/dtprintinfo included with Compaq Tru64 UNIX is a program for opening the CDE Print Manager window. This program is installed as SUID root. In dtprintinfo it is possible to restore a client to the original desktop state by loading the session file using the "-session" option. A buffer overflow will occur in dtprintinfo when an unusually long string of characters is used in session filenames. This will result in the possibility for the local attacker to execute arbitrary code as root. Affected Versions: ------------------ Compaq Tru64 UNIX V4.0F Compaq Tru64 UNIX V5.0 Compaq Tru64 UNIX V5.1 Compaq Tru64 UNIX V5.1A Solution: --------- This problem can be eliminated by applying an appropriate patch to your Tru64 UNIX version based on the information in the following URL: Compaq SECURITY BULLETIN (SSRT-541) Potential Security Vulnerabilities in Tru64,Unix,CDE,NFS,and NIS: http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml Discovered by: -------------- Noboru Yoshinaga yosinagaat_private Disclaimer: ----------- All information in these advisories are subject to change without any advanced notices neither mutual consensus, and each of them is released as it is. LAC Co.,Ltd. is not responsible for any risks of occurrences caused by applying those information.
This archive was generated by hypermail 2b30 : Wed Apr 17 2002 - 11:05:21 PDT