Solaris IP Tunnel Parameter Processing Bug Lets Local Users Gain Root Privileges
|
SecurityTracker Alert ID: 1021464 |
SecurityTracker URL: http://securitytracker.com/id/1021464
|
CVE Reference:
CVE-2008-5689
(Links to External Site)
|
Updated: Feb 9 2009
|
Original Entry Date: Dec 18 2008
|
Impact:
Denial of service via local system, Execution of arbitrary code via local system, Root access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 10, OpenSolaris
|
Description:
A vulnerability was reported in Solaris. A local user can obtain root privileges on the target system. A local user can cause denial of service conditions.
A local user can send a specially crafted IOCTL request to trigger a null pointer dereference and execute arbitrary commands on the target system with root privileges.
A local user can also exploit this to cause a system panic.
The vulnerability resides in the tun(7M) IP tunnel parameter processing.
The vendor was notified on September 4, 2007.
Tobias Klein reported this vulnerability.
The original advisory is available at:
http://www.trapkit.de/advisories/TKADV2008-015.txt
|
Impact:
A local user can obtain root privileges on the target system.
A local user can cause a kernel panic.
|
Solution:
The vendor has issued the following fixes.
SPARC Platform
* Solaris 10 with patch 138888-01 or later
* OpenSolaris based upon builds snv_77 or later
x86 Platform
* Solaris 10 with patch 138889-01 or later
* OpenSolaris based upon builds snv_77 or later
The vendor's advisory is available at:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-242266-1
|
Vendor URL: sunsolve.sun.com/search/document.do?assetkey=1-66-242266-1 (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|