[6104] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Telnet vulnerability--shared library loading

daemon@ATHENA.MIT.EDU (Mario Klebsch DG1AM)
Thu Nov 2 09:57:27 1995

To: kerberos@MIT.EDU
Date: 2 Nov 95 13:50:30 GMT
From: mkl@rob.cs.tu-bs.de (Mario Klebsch DG1AM)

Casper.Dik@Holland.Sun.COM (Casper H.S. Dik - Network Security Engineer) writes:

>Solaris 2.5 telnetd was fixed just in time for FCS.

>However, anyone running almost any alpha/beta version of Solaris 2.5
>is vulnerable to this problem.

>Solaris 2.4 and earlier Sun telnetds (including SunOS 4.x) did
>not pass environment variables other than $TERM.

>For Suns, the easiest way to check is this (using a modern telnet client):

>% telnet
>telnet> env define LD_PRELOAD /no-such-file
>telnet> env export LD_PRELOAD
>telnet> open host

LD_PRELOAD and login?

# ls -l `which login`
-r-sr-xr-x   1 root     bin        27260 Jul 16  1994 /usr/bin/login
#

This has been a problem before. But I heared, they remove the LD_* env
variables now, when an suid root executable is started. Perhaps it
cannot determine, it is suid root, when it is started as root. But
then, running telnetd as nobody would cure the problem, wouldn't it?

73, Mario
--
Mario Klebsch, DG1AM, M.Klebsch@tu-bs.de		+49 531 / 391 - 7457
Institut fuer Robotik und Prozessinformatik der TU Braunschweig
Hamburger Strasse 267, 38114 Braunschweig, Germany

home help back first fref pref prev next nref lref last post