It looks dtaction has dropped the root privilege(setuid(getuid())) before overflow happens. So this bug won't give you any more privilege. [Solaris 7, SPARC] [root@ /]> truss -t'!all' -u libc:getuid,setuid /usr/dt/bin/dtaction foo `perl -e 'print "A"x4000'` -> libc:getuid(0x4, 0x1, 0x0, 0xfed78458) <- libc:getuid() = 0 -> libc:getuid(0x1, 0x3, 0xff31c258, 0x13a18) <- libc:getuid() = 0 -> libc:setuid(0x0, 0x0, 0xffbeedf8, 0x24400) <- libc:setuid() = 0 -> libc:getuid(0x4, 0x1, 0x0, 0xfed78458) <- libc:getuid() = 0 Incurred fault #6, FLTBOUNDS %pc = 0xFEEB6C50 siginfo: SIGSEGV SEGV_MAPERR addr=0x41413D41 Received signal #11, SIGSEGV [default] siginfo: SIGSEGV SEGV_MAPERR addr=0x41413D41 *** process killed *** ---Original Message--- From : <bknightat_private> Date : Tue, 16 Oct 2001 06:57:24 +0900 (KST) > > r0ar Security Advisory > October 5, 2001 > > Buffer overflow vulnerability in action argument of dtaction [...snip...] > > --- > http://www.r0ar.org (formely known as ksecurity) > > e-mail : bknightat_private > > > Regards, warning3 <warning3at_private> http://www.nsfocus.com
This archive was generated by hypermail 2b30 : Tue Oct 16 2001 - 09:29:35 PDT