[11030] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris libc exploit

daemon@ATHENA.MIT.EDU (Brandon Hume)
Thu Jul 15 17:04:30 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id:  <199907141916.QAA09351@Den.BOFH.Halifax.NS.Ca>
Date:         Wed, 14 Jul 1999 16:16:30 -0300
Reply-To: Brandon Hume <hume@DEN.BOFH.HALIFAX.NS.CA>
From: Brandon Hume <hume@DEN.BOFH.HALIFAX.NS.CA>
X-To:         BUGTRAQ@NETSPACE.ORG
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <199905261120.MAA15848@otis.UK.Sun.COM> from Peter Harvey Solaris
              Sustaining Engineering at "May 26, 1999 12:20: 3 pm"

> > 4118295 LC_* can be used to obtain root access from setuid programs
> This is already fixed in Solaris 7 and the following patches for
> Solaris 2.6:
>   RELEASE     ARCH  PATCH
>   5.6         i386  105211-06
>   5.6         sparc 105210-06

OK, did I miss the later messages on this topic?  I've been waiting for a
formal announcement from Sun, or a real patch, or someone to say that this
patch definitely fixes the problem, or SOMETHING...

I don't know what version of patching Peter was talking about, but right
now, I can consistently gain root on my Solaris 7 sparc box, with MU2
applied, using the LC_MESSAGES buffer overflow exploit.  And I can
consistently do Bad Things to sh on a Solaris 2.6 box with 105210-19
(its a production machine, I can't actively root it).

I'm praying I missed something.  Did I?

--
Brandon Hume    - hume -> BOFH.Halifax.NS.Ca, http://WWW.BOFH.Halifax.NS.Ca/
                       -> Solaris Snob and general NOCMonkey

home help back first fref pref prev next nref lref last post