Entercept Ricochet Security Advisory: Solaris snmpdx Vulnerabilities

From: Entercept Ricochet Team (Ricochetat_private)
Date: Tue Jun 04 2002 - 09:28:49 PDT

  • Next message: bugzillaat_private: "[RHSA-2002:097-08] Updated xchat packages fix /dns vulnerability"

    Entercept Ricochet Advisory
    Solaris snmpdx Vulnerabilities
    http://www.entercept.com/news/uspr/06-03-02.asp
    
    DETAILS
    An unchecked buffer in Sun's Solaris SNMP component can be overrun and remotely exploited, allowing an attacker to execute arbitrary code with root privileges. There is also a format string vulnerability in Solaris that can be exploited, allowing a hacker to execute arbitrary code with root privileges.
    The buffer overflow occurs in the MIB parsing component and the format string vulnerability in the logging component of snmpdx, which is installed by default with the Solaris Operating System. Exploiting these vulnerabilities would give an attacker complete control of the attacked server. 
    VERSIONS AFFECTED
    Solaris 2.6, 7, and 8
    FIX INFORMATION
    Entercept worked closely with the Sun Security team, while they developed a patch. Information on the patch is available at Sun's Security Bulletin #00219 at http://sunsolve.sun.com/pub-cgi/secBulletin.pl.
    
    ABOUT RICOCHET
    
    Entercept's Ricochet team is a specialized group of security researchers dedicated to identifying, assessing, and evaluating intelligence regarding server threats. The Ricochet team researches current and future avenues of attack and builds this knowledge into Entercept's intrusion prevention solution. Ricochet is dedicated to providing critical, viable security content via security advisories and technical briefs. This content is designed to educate organizations and security professionals about the nature and severity of Internet security threats, vulnerabilities and exploits.
    



    This archive was generated by hypermail 2b30 : Tue Jun 04 2002 - 12:28:42 PDT