The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] HP-UX stmkfont Local Privilege Escalation Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 25 Oct 2004 15:49:23 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [UNIX] HP-UX stmkfont Local Privilege Escalation Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  HP-UX stmkfont Local Privilege Escalation Vulnerability
------------------------------------------------------------------------


SUMMARY

The stmkfont utility in HP-UX suffers from a vulnerability that may lead 
to privilege escalation with 'bin' group privileges.

DETAILS

Vulnerable Systems:
 * HP-UX B.11.00
 * HP-UX B.11.11
 * HP-UX B.11.22
 * HP-UX B.11.23

Immune Systems:
 * HP-UX systems with patches PHSS_31990 - HP-UX B.11.23, PHSS_31989 - 
HP-UX B.11.22, PHSS_31988 - HP-UX B.11.11, PHSS_31987 - HP-UX B.11.00

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0965>; 
CAN-2004-0965

HP-UX stmkfont is installed sgid 'bin' bit by default. Stmkfont uses 
relative paths when executing external commands. Thus, local attackers 
could cause stmkfont to execute any specified external command by setting 
the PATH environment variable. Therefore, attackers could run arbitrary 
commands with the privileges of group 'bin'.

Workaround
As a temporary workaround, the stmkfont executable can be run without the 
sgid 'bin' bit. In order to disable it:
# chmod a-s /usr/bin/stmkfont

Vendor Status:
The vendor (HP-UX) has released a security bulletin  
<http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01088>; 
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01088 
regarding this issue, along with patches for vulnerable OS versions.

Note: A valid ITRC account is required for the link above.

Patch IDs:
 * PHSS_31990 - HP-UX B.11.23
 * PHSS_31989 - HP-UX B.11.22
 * PHSS_31988 - HP-UX B.11.11
 * PHSS_31987 - HP-UX B.11.00


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> 
NSFOCUS Security Team.
The original article can be found at:  
<http://www.nsfocus.com/english/homepage/research/0402.htm>; 
http://www.nsfocus.com/english/homepage/research/0402.htm




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру