SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Ping Vendors:   Sun
Sun Solaris Buffer Overflow in 'ping' May Let Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1012368
SecurityTracker URL:  http://securitytracker.com/id/1012368
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 1 2004
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Sun Solaris ping command. A local user may be able to obtain elevated privileges.

Sun reported that there is a buffer overflow vulnerability in the ping(1M) command. No further details were provided.

Impact:   A local user may be able to obtain elevated privileges.
Solution:   Sun has issued the following fixes:

SPARC Platform

* Solaris 7 with patch 118313-01 or later
* Solaris 8 with patch 116986-02 or later
* Solaris 9 with patch 116774-03 or later

x86 Platform

* Solaris 7 with patch 118314-01 or later
* Solaris 8 with patch 116987-02 or later
* Solaris 9 with patch 116775-03 or later

As a workaround, Sun indicates that you can remove the set user id (setuid) bit:

# chmod u-s /usr/sbin/ping

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-26-57675-1 (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  7, 8, and 9

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC