Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (VPN)  >   Nortel Net Direct Vendors:   Nortel
Nortel Net Direct SSL VPN Client Race Condition Lets Local Users Gain Root Privileges
SecurityTracker Alert ID:  1017678
SecurityTracker URL:
CVE Reference:   CVE-2007-1057   (Links to External Site)
Updated:  May 19 2008
Original Entry Date:  Feb 21 2007
Impact:   Execution of arbitrary code via local system, Modification of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 6.0.5
Description:   A vulnerability was reported in the Nortel Net Direct client for Linux. A local user can obtain root privileges on the target system.

A local user can exploit a race condition to modify certain temporary files to cause arbitrary code to be executed on the target system when the target user starts a VPN session. The code will run with root privileges.

The software creates the world-writable client, askpass, and surun files in '/tmp/NetDirect'. A local user can modify these files after they are created but before they are run.

Nortel credits Jon Hart of with reporting this vulnerability.

The original advisory, including demonstration exploit code, is available at:

Impact:   A local user can obtain root privileges on the target system.
Solution:   The vendor has issued a fixed version (6.0.5).

The Nortel advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC