Solaris arp Buffer Overflow Vulnerability
BID:2193
Info
Solaris arp Buffer Overflow Vulnerability
| Bugtraq ID: | 2193 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | No |
| Local: | Yes |
| Published: | Jan 12 2001 12:00AM |
| Updated: | Jan 12 2001 12:00AM |
| Credit: | Discovered by Pablo Sor <[email protected]> on Nov 28, 2000. |
| Vulnerable: |
Sun Solaris 2.5.1 _x86 Sun Solaris 2.5.1 Sun Solaris 7.0_x86 Sun Solaris 7.0 Sun Solaris 2.6_x86 Sun Solaris 2.6 Sun Solaris 2.5_x86 Sun Solaris 2.5 Sun Solaris 2.4_x86 Sun Solaris 2.4 |
| Not Vulnerable: | |
Discussion
Solaris arp Buffer Overflow Vulnerability
The arp utility is used for viewing and manipulating tables containing network to hardware address mappings. On Solaris systems up to version 8, arp is installed setgid and owned by group bin.
For convenience, Solaris arp supports the option to insert multiple entries contained in a file at once with the -f parameter. The field values in the file are extracted as strings via sscanf(). As a result, there is nothing to ensure that their length does not exceed the size of the local variables allocated to store them. It is possible to overwrite stack variables and corrupt program execution flow if fields in the supplied file are oversized.
This vulnerability can be exploited to execute code with effective groupid bin privileges. Group 'bin' privileges on Solaris systems can lead to root access.
Solaris has released patches for this vulnerability, which are in the solution section.
The arp utility is used for viewing and manipulating tables containing network to hardware address mappings. On Solaris systems up to version 8, arp is installed setgid and owned by group bin.
For convenience, Solaris arp supports the option to insert multiple entries contained in a file at once with the -f parameter. The field values in the file are extracted as strings via sscanf(). As a result, there is nothing to ensure that their length does not exceed the size of the local variables allocated to store them. It is possible to overwrite stack variables and corrupt program execution flow if fields in the supplied file are oversized.
This vulnerability can be exploited to execute code with effective groupid bin privileges. Group 'bin' privileges on Solaris systems can lead to root access.
Solaris has released patches for this vulnerability, which are in the solution section.
Exploit / POC
Solution / Fix
Solaris arp Buffer Overflow Vulnerability
Sun Solaris 2.6
Sun Solaris 7.0
Sun Solaris 2.4_x86
Sun Solaris 2.6_x86
Sun Solaris 2.5
Sun Solaris 7.0_x86
Sun Solaris 2.5_x86
Sun Solaris 2.4
Sun Solaris 2.5.1 _x86
Sun Solaris 2.5.1
Sun Solaris 2.6
Sun Solaris 7.0
Sun Solaris 2.4_x86
Sun Solaris 2.6_x86
Sun Solaris 2.5
Sun Solaris 7.0_x86
Sun Solaris 2.5_x86
Sun Solaris 2.4
Sun Solaris 2.5.1 _x86
Sun Solaris 2.5.1
References
Solaris arp Buffer Overflow Vulnerability
References:
References:
- Sun Patch Access Page (Sun Microsystems)
- Sunsolve Online(tm) (Sun Microsystems)