eSecurityOnline Security Advisory 3761 - Sun Solaris lbxproxy dis play name buffer overflow vulnerability

From: researchteam5at_private
Date: Mon Apr 29 2002 - 13:14:05 PDT

  • Next message: GreyMagic Software: "Reading local files in Netscape 6 and Mozilla (GM#001-NS)"

    eSO Security Advisory:  3761  
    Discovery Date:         July 5, 2001 
    ID:                     eSO:3761
    Title:                  Sun Solaris lbxproxy display name buffer
                            overflow vulnerability 
    Impact:                 Local attackers can gain group root privileges 
    Affected Technology:    Sun Solaris 8 x86 
    Vendor Status:          Vendor notified
    Discovered By:          Kevin Kotas of the eSecurityOnline Research
                            and Development Team 
    CVE Reference:          CAN-2002-0090 
    
    Advisory Location:
    http://www.eSecurityOnline.com/advisories/eSO3761.asp 
    
    Description:
    Sun Solaris lbxproxy is vulnerable to a buffer overflow condition that
    can allow an attacker to execute arbitrary code. The overflow occurs
    due to insufficient bounds checking on the display command line
    option. A display name can be given that, when processed, will alter
    program execution.  
    
    Technical Recommendation:
    As a workaround solution, remove the setgid bit from the program.
    
    chmod -s /usr/openwin/bin/lbxproxy  
    
    Copyright 2002 eSecurityOnline LLC.  All rights reserved.  
    
    THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
    ESECURITYONLINE LLC "AS IS", "WHERE IS", WITH NO WARRANTY OF ANY KIND,
    AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
    NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
    CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
    THIS VULNERABILITY ALERT.
    



    This archive was generated by hypermail 2b30 : Mon Apr 29 2002 - 18:38:07 PDT