The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] IBM AIX ctstrtcasd Local File Corruption Vulnerability


<< Previous INDEX Search src / Print Next >>
Date: 1 Oct 2004 10:28:51 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [UNIX] IBM AIX ctstrtcasd Local File Corruption Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  IBM AIX ctstrtcasd Local File Corruption Vulnerability
------------------------------------------------------------------------


SUMMARY

The ctstrtcasd program is a setuid root application, installed by default 
under newer versions of IBM AIX. It is part of the Reliable Scalable 
Cluster Technology (RSCT) system.  It is also installed with multiple IBM 
products under Linux, including IBM Tivoli System Automation, IBM Cluster 
Systems Management, IBM Hardware Management Console, and IBM General 
Parallel File System.
Local exploitation of an input validation vulnerability in the ctstrtcasd 
command included by default in multiple versions of IBM Corp. AIX could 
allow for the corruption or creation of arbitrary files anywhere on the 
system.

DETAILS

Vulnerable Systems:
 * iDEFENSE has confirmed the existence of this vulnerability in IBM AIX 
5.2.
Products shipping and installing these affected versions of RSCT as 
reported by IBM are as follows:
 * IBM AIX 5L Version 5.2 on pSeries
 * IBM AIX 5L Version 5.3 on pSeries
 * IBM AIX 5L Version 5.2, 5.3 on an i5/OS (iSeries) partition
 * IBM Tivoli System Automation (TSA) for Linux 1.1
 * IBM Tivoli System Automation (TSA) for Multiplatforms 1.2
 * IBM Cluster Systems Management (CSM) for Linux Version 1.4 (version 1.4 
and greater)
 * IBM Hardware Management Console (HMC) for pSeries Version 3
 * IBM Hardware Management Console (HMC) for pSeries Version 4
 * IBM General Parallel File System (GPFS) Version 2 Release 2 on Linux 
for xSeries and Linux for pSeries

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0828>; 
CAN-2004-0828

If a user specifies a file with the -f option, the contents of that file 
will be overwritten with 65,535 bytes of application trace data. If the 
file doesn't exist, it will be created. The file creation/overwrite is 
done with root privileges, thus allowing an attacker to cause a denial of 
service condition by damaging the file system or by filling the drive with 
65,535 byte files.

All that is required to exploit this vulnerability is a local account. 
Exploitation does not require any knowledge of application internals, 
making exploitation trivial, even for unskilled attackers. It is not 
evident that privilege escalation is possible through abuse of this.

Workaround:
Only allow trusted users local access to security critical systems. 
Alternately, remove the setuid bit from ctstrtcasd using:
chmod 555 /usr/sbin/rsct/bin/ctstrtcasd

Vendor Status:
"Apply the workarounds or APARs as described [in the associated IBM 
Security Alert]. If you would like to receive AIX Security Advisories via 
email, please visit:  
<https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs> 
https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs"

Disclosure Timeline:
08/11/2004   Initial vendor notification
08/25/2004   Secondary vendor notification
08/26/2004   Vendor response
09/27/2004   Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:customerservice@idefense.com.> iDEFENSE.
The original article can be found at:  
<www.idefense.com/application/poi/display?id=144&type=vulnerabilities> 
www.idefense.com/application/poi/display?id=144&type=vulnerabilities




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру