SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   idtools Vendors:   Jarc, Paul
Idtools Authentication Utilities May Let a Local User Elevate Privileges and Gain Root Level Access on the Host
SecurityTracker Alert ID:  1001839
SecurityTracker URL:  http://securitytracker.com/id/1001839
CVE Reference:   CVE-2001-1324   (Links to External Site)
Updated:  May 22 2009
Original Entry Date:  Jun 26 2001
Impact:   Modification of system information, Root access via local system, User access via local system
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the idtools package that could allow a local user to obtain elevated privileges.

The vendor reports that idtools includes two commands (cvmlogin and statfile) that use pathexec_env from DJB's unix library but fail to check the return value for memory allocation failure. As a result, some environment variables that should be set might not be if memory is tight.

The vendor reports that this condition is exploitable in cvmlogin, but the exploit method is nontrivial. It is reported that if the $UID environment variable is already set, cvmlogin will not override it, and its inherited value will be passed to the child. The timing of the attack is reported to be nontrivial, as memory must become available for the child to exec(). The vendor notes that the child runs $SHELL as $UID in the default configration. As a result, a successful login for a non-root account might thus gain root privileges.

Impact:   A local user could obtain root level privileges on the host.
Solution:   The vendor is preparing a solution, reportedly to be released on June 27, 2001.
Vendor URL:  multivac.cwru.edu./idtools/ (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents

Subject:  [local] [control] idtools doesn't check memory allocation failure


My idtools package (<URL:http://multivac.cwru.edu./idtools/>, both
versions) includes two commands (cvmlogin and statfile) that use
pathexec_env from DJB's unix library; they fail to check the return
value for memory allocation failure.  Result: some environment
variables that should be set might not be if memory is tight.

For cvmlogin, this is exploitable, with difficulty: if $UID is already
set in the environment (grr bash), cvmlogin will not override it, and
its inherited value will be passed to the child.  (Memory must become
available for the child to exec(), so timing makes this attack
nontrivial.)  In the default configuration, the child runs $SHELL as
$UID.  A successful login for a non-root account might thus gain root
privileges.

Expect a fix tomorrow.


paul


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC