SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   idtools Vendors:   Jarc, Paul
Idtools Authentication Utilities May Let a Local User Elevate Privileges and Gain Root Level Access on the Host
SecurityTracker Alert ID:  1001839
SecurityTracker URL:  http://securitytracker.com/id/1001839
CVE Reference:   CVE-2001-1324   (Links to External Site)
Updated:  May 22 2009
Original Entry Date:  Jun 26 2001
Impact:   Modification of system information, Root access via local system, User access via local system
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the idtools package that could allow a local user to obtain elevated privileges.

The vendor reports that idtools includes two commands (cvmlogin and statfile) that use pathexec_env from DJB's unix library but fail to check the return value for memory allocation failure. As a result, some environment variables that should be set might not be if memory is tight.

The vendor reports that this condition is exploitable in cvmlogin, but the exploit method is nontrivial. It is reported that if the $UID environment variable is already set, cvmlogin will not override it, and its inherited value will be passed to the child. The timing of the attack is reported to be nontrivial, as memory must become available for the child to exec(). The vendor notes that the child runs $SHELL as $UID in the default configration. As a result, a successful login for a non-root account might thus gain root privileges.

Impact:   A local user could obtain root level privileges on the host.
Solution:   The vendor is preparing a solution, reportedly to be released on June 27, 2001.
Vendor URL:  multivac.cwru.edu./idtools/ (Links to External Site)
Cause:   Resource error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Date:  26 Jun 2001 16:02:42 -0400
Subject:  [local] [control] idtools doesn't check memory allocation failure


My idtools package (<URL:http://multivac.cwru.edu./idtools/>, both
versions) includes two commands (cvmlogin and statfile) that use
pathexec_env from DJB's unix library; they fail to check the return
value for memory allocation failure.  Result: some environment
variables that should be set might not be if memory is tight.

For cvmlogin, this is exploitable, with difficulty: if $UID is already
set in the environment (grr bash), cvmlogin will not override it, and
its inherited value will be passed to the child.  (Memory must become
available for the child to exec(), so timing makes this attack
nontrivial.)  In the default configuration, the child runs $SHELL as
$UID.  A successful login for a non-root account might thus gain root
privileges.

Expect a fix tomorrow.


paul


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC