[23276] in bugtraq
UNICOS LOCAL HOLE ALL VERSIONS
daemon@ATHENA.MIT.EDU (Mickey Mouse)
Wed Nov 28 09:36:33 2001
From: "Mickey Mouse" <mmsquadron@hotmail.com>
To: bugtraq@securityfocus.com
Date: Tue, 27 Nov 2001 22:06:21 +0000
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F27191E9GQvnbEG10Ga00026dbd@hotmail.com>
*********** CRAY UNICOS NQSD FORMAT BUG LOCAL ROOT COMPROMISE ALL VERSIONS
***********
MICKEY MOUSE HACKING SQUADRON ADVISORY #: 1
DISCLAIMER
----------
We are a collective group of security professionals who want to remain
nameless due to the various legal and corporate red tape which now surrounds
the issue of disclosure in today's IT security environments. However, due to
the fact that we have unsuccessfully been able to convince vendors to take
appropriate actions in fixing these gaping security holes, we have decided
to take the option of becoming nameless and releasing this advisory in such
a way. Due to the nature of many of the severe vulnerabilities we have
discovered, we will enclose only minimal details about the holes, and no
working exploit code.
BEGIN
-----
NATURE
------
Local root compromise of any UNICOS computer running the NQS daemon
VULNERABLE PLATFORMS/SOFTWARE
-----------------------------
All versions of cray's UNIX Cray Operating System running NQSD
Possibly NQSD running in IBM and Solaris environments as well.
SUCCESSFULLY TESTED ON
----------------------
Cray T3E running UNICOS/mk revision 2.0.5.54
HISTORY
-------
The NQS, or Network Queueing System, is a popular batch software processor
which is used to perform job control and leveraging in supercomputing
environments which require heavy symmetric multi processing. The controlling
daemon, which looks like it appears below
37152 ? 0:00 nqsdaemon
57415 ? 0:00 nqsdaemon
runs as root in order to properly schedule and timeslice batched process.
The Mickey Mouse Hacking Squadron has discovered a format bug vulnerbility
by which any unprivileged user on a system running NQS can gain root access.
This involves creating a batch with a name that contains special formatting
characters, which is processed by an unsafe function taking a variable
argument list. In order to exploit this vulnerability, the user must be able
to submit the job with qsub in such a way that it triggers this
vulnerability.
DESCRIPTION
The qsub command submits a file that contains a shell script as
a batch request to the Network Queuing System (NQS). For an
introduction to the use of NQS, see the Network Queuing System
(NQS)User's Guide, publication SG-2105.
This vulnerability has been exploited successfully by the MMHS in a RISC
environment, using ALPHA processors, in a way similar to bugs exploited
successfully on Digital UNIX by SeungHyun Seo, also posted to the Bugtraq
mailing list. The exploitation on vectorized processors, such as the Y-MP
series, has proved to be much more difficult, especially due to large 64 bit
addressing and a large number of NULL bytes in the process address space.
This should also prove easy to exploit on PowerPC and SPARC environments.
VENDOR STATUS
-------------
NO RESPONSE FROM CRAY!
REFERENCES
----------
1). "Format String Attack on alpha system" Seunghyun Seo (truefinder),
2001/09/24
http://cert.uni-stuttgart.de/archive/bugtraq/2001/09/msg00264.html
CONTACT
-------
We are looking for feedback and new members! EMAIL us with any concerns you
might have.
Note: We are not a blackhat organization, just a group of concerned
professionals!
MMSquadron@hotmail.com for any comments or suggestions!
GREETINGS
---------
Team TESO, Aleph1, M. Zalewski, Georgi, zen-parse, Simple Nomad, HERT,
GOBBLES
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp