[18231] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris patchadd(1) (3) symlink vulnerabilty

daemon@ATHENA.MIT.EDU (Juergen P. Meier)
Wed Dec 20 17:07:17 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20001220103022.A10172@fm.rz.fh-muenchen.de>
Date:         Wed, 20 Dec 2000 10:30:22 +0100
Reply-To: jpm@class.de
From: "Juergen P. Meier" <jpm@CLASS.DE>
X-To:         Paul Szabo <psz@MATHS.USYD.EDU.AU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200012190800.TAA05385@milan.maths.usyd.edu.au>; from
              psz@MATHS.USYD.EDU.AU on Tue, Dec 19, 2000 at 07:00:20PM +1100

Solaris /usr/sbin/patchadd is a /bin/ksh script.
The problem lies in the vulnerability of ksh.

However: Sun Microsystems does recommend to only install
patches at single-user mode (runlevel S). So no other
possibly malicious user can exploit this ksh behaviour.

at least after the ebay desaster we should have all learned
this lesson... ;)

Always do init S before applying solaris patches. (especially
if you do kernel or devicedriver patches, check your readme's).

Again: if you follow the Vendors recommendations, you are
not vulnerable.

cheers,

Juergen

On Tue, Dec 19, 2000 at 07:00:20PM +1100, Paul Szabo wrote:
> Jonathan Fortin <jfortin@REVELEX.COM> wrote:
>
> > When patchadd is executed, It creates a temporary file called
> > "/tmp/sh<pidofpatchadd>.1" , "/tmp/sh<pidofpatchadd>.2 ,
> > "/tmp/sh<pidofpatchadd>.3  and assigns them mode 666 ...
>
> I guess that patchadd is a "sh" script using the "<<" construct, this
> being an instance of the bug I reported recently:
>
>   http://www.securityfocus.com/templates/archive.pike?list=1&msg=200011230225.NAA19716@milan.maths.usyd.edu.au
>
> This is essentially the same as the tcsh bug fixed recently in other OSs.
>
> Paul Szabo - psz@maths.usyd.edu.au  http://www.maths.usyd.edu.au:8000/u/psz/
> School of Mathematics and Statistics  University of Sydney   2006  Australia

--
Juergen P. Meier                        email: jpm@class.de

home help back first fref pref prev next nref lref last post