HPUX rexec buffer overflow vulnerability

From: Davide Del Vecchio (danteat_private)
Date: Tue Apr 29 2003 - 10:51:12 PDT

  • Next message: Lucas Holt: "Re: Windows Server 2003 Security Guide available"

    =======================================================
       HPUX rexec buffer overflow vulnerability
    ======================================================= 
    
    Davide Del Vecchio Adv#5 
    
    Discovered in: 19/02/2003
    Date: 29/04/2003
    Tested on HP-UX B.10.20 
    
    
    Description: 
    
    The rexec command works the same as remsh except that it uses the
    rexec() library routine and rexecd for command execution
    and does not support Kerberos authentication.
    The "-l" option is used to specify a different remote username. 
    
    $ ls -al rexec
     -r-sr-xr-x   1 root       bin          20480 Oct 27  1997 rexec 
    
    Using rexec with "-l" with a long option string: 
    
    $ rexec 127.0.0.1 -l `perl -e 'printf "A" x 9777'` -n something
    Memory fault 
    
    Solution: 
    
    I'm in contact with HP's Security staff, especially with John Morris,
    and I would like to thanks him and all his staff for the interest
    demonstrated during this period of research on HP-UX.
    He assured me a patch has been written and an Official Security Bullettin
    will follow my advisory. 
    
    Credits: 
    
    Davide Del Vecchio would like to thank all the people supporting him
    and his research, his coworkers of the security and monitoring staff @ Banca 
    Mediolanum,
    and obvious, the HP-UX security staff, impersonified in this case in John 
    Morris. 
    
    
    Disclaimer: 
    
    The information within this paper may change without notice. Use of this
    information constitutes acceptance for use in an AS IS condition.
    There are NO warranties with regard to this information. In no event shall
    the author be liable for any damages whatsoever arising out of or in
    connection with the use or spread of this information. Any use of this
    information is at the user's own risk.
    ^^^^^^^^ 
    
    Please send suggestions, updates, and comments to:
    Davide Del Vecchio , Dante Alighieri - danteat_private / securityat_private
    www.alighieri.org
    



    This archive was generated by hypermail 2b30 : Tue Apr 29 2003 - 12:49:53 PDT