Solaris arp Buffer Overflow Vulnerability

BID:2193

Info

Solaris arp Buffer Overflow Vulnerability

Bugtraq ID: 2193
Class: Boundary Condition Error
CVE:
Remote: No
Local: Yes
Published: Jan 12 2001 12:00AM
Updated: Jan 12 2001 12:00AM
Credit: Discovered by Pablo Sor <[email protected]> on Nov 28, 2000.
Vulnerable: Sun Solaris 2.5.1 _x86
Sun Solaris 2.5.1
Sun Solaris 7.0_x86
Sun Solaris 7.0
Sun Solaris 2.6_x86
Sun Solaris 2.6
Sun Solaris 2.5_x86
Sun Solaris 2.5
Sun Solaris 2.4_x86
Sun Solaris 2.4
Not Vulnerable:

Discussion

Solaris arp Buffer Overflow Vulnerability

The arp utility is used for viewing and manipulating tables containing network to hardware address mappings. On Solaris systems up to version 8, arp is installed setgid and owned by group bin.

For convenience, Solaris arp supports the option to insert multiple entries contained in a file at once with the -f parameter. The field values in the file are extracted as strings via sscanf(). As a result, there is nothing to ensure that their length does not exceed the size of the local variables allocated to store them. It is possible to overwrite stack variables and corrupt program execution flow if fields in the supplied file are oversized.

This vulnerability can be exploited to execute code with effective groupid bin privileges. Group 'bin' privileges on Solaris systems can lead to root access.

Solaris has released patches for this vulnerability, which are in the solution section.

Exploit / POC

Solaris arp Buffer Overflow Vulnerability

exploit available

Solution / Fix

Solaris arp Buffer Overflow Vulnerability


Sun Solaris 2.6
  • Sun 109719


Sun Solaris 7.0
  • Sun 109709


Sun Solaris 2.4_x86
  • Sun 109724


Sun Solaris 2.6_x86
  • Sun 109720


Sun Solaris 2.5
  • Sun 109707


Sun Solaris 7.0_x86
  • Sun 109710


Sun Solaris 2.5_x86
  • Sun 109708


Sun Solaris 2.4
  • Sun 109723


Sun Solaris 2.5.1 _x86
  • Sun 109722


Sun Solaris 2.5.1
  • Sun 109721

References

Solaris arp Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report