eSecurityOnline Security Advisories notes

2002-04-30 Thread researchteam5


Hello,

To help clear up any confusion about the Discovery Dates associated 
with the group of advisories that we are publishing today, I should
explain the situation.

We are publishing our advisories in groups after each group is approved
internally.  With the exception of the Microsoft issues, none of the 
vulnerabilities have been posted or discussed in public forums or lists.

The discovery date that we list in the advisories refers to the date on
which we discovered the advisory, rather than the date that we made the
information public.  Since none of these vulnerabilities (except for the 
Solaris CACHEFSD) have been actively exploited / seen in the wild, we have
been patient in working with and waiting for vendors to complete
vulnerability validation, and for patches to be developed and posted to
vendor sites.

We plan to publish more advisories in the near future, and hopefully in a
much more timely fashion.

Regards,
Ken Williams
eSecurityOnline Research and Development Team

Ken Williams ; CISSP ; Technical Lead ; [EMAIL PROTECTED] 
eSecurityOnline - an eSecurity Venture of Ernst  Young 
[EMAIL PROTECTED] ; www.esecurityonline.com ; 1-877-eSecurity 



eSecurityOnline Security Advisory 2397 - Sun Solaris admintool -d and PRODVERS buffer overflow vulnerabilities

2002-04-29 Thread researchteam5


eSO Security Advisory:  2397  
Discovery Date: March 28, 2000 
ID: eSO:2397
Title:  Sun Solaris admintool -d and PRODVERS buffer
overflow vulnerabilities 
Impact: Local attackers can gain root privileges
Affected Technology:Solaris 2.5, 2.5.1, 2.6, 7, 8 SPARC and x86 
Vendor Status:  Patches are available
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
CVE Reference:  CAN-2002-0089 

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO2397.asp 

Description:
The Sun Solaris admintool utility is vulnerable to multiple buffer
overflow conditions that allow a local attacker to gain root access.
The problems are due to insufficient bounds checking on command line
options and on a configuration file variable. An attacker can use a 
carefully constructed string with the -d command line option or with
the PRODVERS .cdtoc file variable to gain root privileges.

The first buffer overflow is related to command line execution of
admintool with the -d switch, when a long string is used with 
/Solaris present.

The second buffer overflow occurs due to a lack of bounds checking 
for the PRODVERS argument in the .cdtoc file. The .cdtoc file is used
to specify variables for installation media. Through the
software/edit/add feature, a local directory can be specified that
contains a .cdtoc file. The file can contain a string of data for
the PRODVERS variable that will cause the program to crash or execute
code when processed.  

Technical Recommendation:
Apply the following patches.

Solaris 2.5: 
103247-16

Solaris 2.5_x86:
103245-16

Solaris 2.5.1:
103558-16

Solaris 2.5.1_x86: 
103559-16

Solaris 2.6: 
105800-07

Solaris 2.6_x86: 
105801-07

Solaris 7: 
108721-02

Solaris 7_x86: 
108722-02

Solaris 8: 
10453-01

Solaris 8_x86:
110454-01

As a workaround solution, remove the setuid permissions with the following:
chmod -s /usr/bin/admintool  

Vendor site:
http://sunsolve.sun.com  

Acknowledgements:
eSecurityOnline would like to thank Sun Microsystems and the Sun security
team for their cooperation in resolving the issue.  

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.



eSecurityOnline Security Advisory 2408 - CIDER SHADOW CGI

2002-04-29 Thread researchteam5


eSO Security Advisory:  2408  
Discovery Date: April 3, 2000 
ID: eSO:2408
Title:  CIDER SHADOW CGI arbitrary command execution
vulnerabilities 
Impact: Remote attackers can execute commands with the
privileges of the running web server process
Affected Technology:CIDER SHADOW 1.5, 1.6 
Vendor Status:  Vendor informed
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
CVE Reference:  CAN-2002-0091 

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO2408.asp 

Description:
The CIDER Project's SHADOW intrusion detection utility is vulnerable to
CGI implementation flaws that allow a remote attacker to run arbitrary
commands on the analyzer. The problem occurs due to insufficient
character verification of sent variables. For multiple CGI scripts, an
attacker can send a specially crafted URL and execute commands with
the privileges of the running server.  

Technical Recommendation:
By design, the analyzer web interface should only be reachable through
an internal network and with password authentication. Since the
possibility remains that an attacker can reach the analyzer, disable
network access to the web interface and only view the web pages
locally.  

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.



eSecurityOnline Security Advisory 4197 - Sun Solaris cachefsd denial of service vulnerability

2002-04-29 Thread researchteam5


eSO Security Advisory:  4197  
Discovery Date: October 29, 2001 
ID: eSO:4197 
Title:  Sun Solaris cachefsd denial of service
vulnerability 
Impact: Remote attackers can cause a denial of service
condition 
Affected Technology:Solaris 2.6, 7, 8 SPARC and x86 
Vendor Status:  Vendor notified 
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
Technical Contributor:  Richard Johnson of the eSecurityOnline
Research and Development Team 
CVE Reference:  CAN-2002-0085 

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO4197.asp 

Description:
Sun Solaris cachefsd is vulnerable to a flaw that allows remote 
attackers to cause a denial of service condition. The problem is due
to the way the program handles RPC requests that contain an invalid
procedure call. An attacker can send a call that will cause cachefsd
to crash.  

Technical Recommendation:
As a workaround solution, ensure RPC services are blocked at the 
firewall. Otherwise, disable cachefsd.

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.



eSecurityOnline Security Advisory 4198 - Sun Solaris cachefsd mount file buffer overflow vulnerability

2002-04-29 Thread researchteam5


eSO Security Advisory:  4198  
Discovery Date: October 29, 2001 
ID: eSO:4198 
Title:  Sun Solaris cachefsd mount file buffer
overflow vulnerability 
Impact: Local attackers can gain root privileges
Affected Technology:Solaris 2.6, 7, 8 SPARC and x86 
Vendor Status:  Vendor notified 
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
Technical Contributor:  Richard Johnson of the eSecurityOnline
Research and Development Team 
CVE Reference:  CAN-2002-0084 

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO4198.asp 

Description:
Sun Solaris cachefsd is vulnerable to a flaw that can allow attackers
to execute arbitrary code. The problem is due to insufficient bounds
checking on mounts that are supplied by a user. An attacker can create
a file and have cachefsd process it to gain root privileges.  

Technical Recommendation:
As a workaround solution, ensure RPC services are blocked at the 
firewall. Otherwise, disable cachefsd.  

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.



eSecurityOnline Security Advisory 4123 - Sun Solaris admintool media installation path buffer overflow vulnerability

2002-04-29 Thread researchteam5


eSO Security Advisory:  4123  
Discovery Date: October 15, 2001 
ID: eSO:4123
Title:  Sun Solaris admintool media installation path
buffer overflow vulnerability 
Impact: Local attackers can gain root privileges
Affected Technology:Sun Solaris 2.6,7,8 SPARC and x86 
Vendor Status:  Vendor notified
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
CVE Reference:  CAN-2002-0088 

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO4123.asp 

Description:
Sun Solaris admintool is vulnerable to a buffer overflow condition
that allows a local attacker to gain root privileges. The problem is
due to insufficient bounds checking on the installation path. An
attacker can create a path, supply it to admintool, and execute 
arbitrary code.  

Technical Recommendation:
As a workaround solution, remove the setuid bit from the binary.

chmod -s /usr/bin/admintool  

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.



eSecurityOnline Security Advisory 2406 - CDE dtprintinfo Help search buffer overflow vulnerability

2002-04-29 Thread researchteam5


eSO Security Advisory:  2406  
Discovery Date: March 31, 2000 
ID: eSO:2406
Title:  CDE dtprintinfo Help search buffer overflow
vulnerability 
Impact: Local attackers can gain root level access
Affected Technology:Solaris 2.4, 2.5, 2.5.1, 2.6, 7, 8 SPARC and x86
HP-UX 10.10, 10.20, 10.24, 11.00, 11.04, 11.11
IBM AIX 4.3, 4.3.1, 4.3.2, 4.3.3
Compaq Tru64 5.1A, 5.1, 5.0A, 4.0G, 4.0F
CDE  
Vendor Status:  Patches are available
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
CVE Reference:  CAN-2001-0551

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO2406.asp 

Description:
The CDE dtprintinfo program is vulnerable to a buffer overflow
condition that allows a local attacker to gain root access. The
problem occurs due to insufficient bounds checking in the Volume
search field from the Help section. An attacker can insert a specially
crafted string for the search parameter and gain root privileges.

In the dtprintinfo Help, an Index search function permits querying by
keyword. If a string of appropriate length is inserted into the 
'Entries with' field and a single Help Volume is selected for the
search, an exploitable buffer overflow will occur.  

Technical Recommendation:
Upgrade with the following patches.

Solaris 2.4, 2.5, 2.5.1 SPARC:
105076-04

Solaris 2.4, 2.5, 2.5.1 x86:
105354-04

Solaris 2.6 SPARC:
106242-03

Solaris 2.6 x86:
106243-03

Solaris 7 SPARC:
107178-02

Solaris 7 x86:
107179-02

Solaris 8 SPARC:
108949-04

Solaris 8 x86:
108950-04

IBM AIX:

AIX 4.3.x:
APAR #IY21539

AIX 5.1:
APAR #IY20917

Compaq:
SSRT1-78U
SSRT0788U
SSRT0757U
SSRT-541

HP-UX:
10.10:   PHSS_23355 
10.20:   PHSS_23796 
10.24:   PHSS_24097 
11.00:   PHSS_23797 
11.04:   PHSS_24098 
11.11:   PHSS_24087, PHSS_24091 

Acknowledgements:
eSecurityOnline would like to thank Sun Microsystems and the Sun 
security team for their cooperation in resolving the issue.  

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.



eSecurityOnline Security Advisory 3761 - Sun Solaris lbxproxy display name buffer overflow vulnerability

2002-04-29 Thread researchteam5


eSO Security Advisory:  3761  
Discovery Date: July 5, 2001 
ID: eSO:3761
Title:  Sun Solaris lbxproxy display name buffer
overflow vulnerability 
Impact: Local attackers can gain group root privileges 
Affected Technology:Sun Solaris 8 x86 
Vendor Status:  Vendor notified
Discovered By:  Kevin Kotas of the eSecurityOnline Research
and Development Team 
CVE Reference:  CAN-2002-0090 

Advisory Location:
http://www.eSecurityOnline.com/advisories/eSO3761.asp 

Description:
Sun Solaris lbxproxy is vulnerable to a buffer overflow condition that
can allow an attacker to execute arbitrary code. The overflow occurs
due to insufficient bounds checking on the display command line
option. A display name can be given that, when processed, will alter
program execution.  

Technical Recommendation:
As a workaround solution, remove the setgid bit from the program.

chmod -s /usr/openwin/bin/lbxproxy  

Copyright 2002 eSecurityOnline LLC.  All rights reserved.  

THE INFORMATION IN THIS VULNERABILITY ALERT IS PROVIDED BY 
ESECURITYONLINE LLC AS IS, WHERE IS, WITH NO WARRANTY OF ANY KIND,
AND ESECURITYONLINE LLC HEREBY DISCLAIMS THE IMPLIED WARRANTIES OF 
NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  ESECURITYONLINE LLC SHALL HAVE NO LIABILITY FOR ANY DAMAGE,
CLAIM OR LOSS RESULTING FROM YOUR USE OF THE INFORMATION CONTAINED IN
THIS VULNERABILITY ALERT.