eSecurityOnline Security Advisory 4198 - Sun Solaris cachefsd mou nt file buffer overflow vulnerability

From: researchteam5at_private
Date: Mon Apr 29 2002 - 14:12:30 PDT

  • Next message: researchteam5at_private: "eSecurityOnline Security Advisory 4123 - Sun Solaris admintool me dia installation path buffer overflow vulnerability"

    eSO Security Advisory:  4198  
    Discovery Date:         October 29, 2001 
    ID:                     eSO:4198 
    Title:                  Sun Solaris cachefsd mount file buffer
                            overflow vulnerability 
    Impact:                 Local attackers can gain root privileges
    Affected Technology:    Solaris 2.6, 7, 8 SPARC and x86 
    Vendor Status:          Vendor notified 
    Discovered By:          Kevin Kotas of the eSecurityOnline Research
                            and Development Team 
    Technical Contributor:  Richard Johnson of the eSecurityOnline
                            Research and Development Team 
    CVE Reference:          CAN-2002-0084 
    
    Advisory Location:
    http://www.eSecurityOnline.com/advisories/eSO4198.asp 
    
    Description:
    Sun Solaris cachefsd is vulnerable to a flaw that can allow attackers
    to execute arbitrary code. The problem is due to insufficient bounds
    checking on mounts that are supplied by a user. An attacker can create
    a file and have cachefsd process it to gain root privileges.  
    
    Technical Recommendation:
    As a workaround solution, ensure RPC services are blocked at the 
    firewall. Otherwise, disable cachefsd.  
    
    Copyright 2002 eSecurityOnline LLC.  All rights reserved.  
    
    THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
    ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND,
    AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
    NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
    PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
    CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
    THIS VULNERABILITY ALERT.
    



    This archive was generated by hypermail 2b30 : Mon Apr 29 2002 - 18:03:07 PDT