Date: 25 Oct 2004 15:49:23 +0200
From: SecuriTeam <[email protected]>
To: [email protected]Subject: [UNIX] HP-UX stmkfont Local Privilege Escalation Vulnerability
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
HP-UX stmkfont Local Privilege Escalation Vulnerability
------------------------------------------------------------------------
SUMMARY
The stmkfont utility in HP-UX suffers from a vulnerability that may lead
to privilege escalation with 'bin' group privileges.
DETAILS
Vulnerable Systems:
* HP-UX B.11.00
* HP-UX B.11.11
* HP-UX B.11.22
* HP-UX B.11.23
Immune Systems:
* HP-UX systems with patches PHSS_31990 - HP-UX B.11.23, PHSS_31989 -
HP-UX B.11.22, PHSS_31988 - HP-UX B.11.11, PHSS_31987 - HP-UX B.11.00
CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0965>
CAN-2004-0965
HP-UX stmkfont is installed sgid 'bin' bit by default. Stmkfont uses
relative paths when executing external commands. Thus, local attackers
could cause stmkfont to execute any specified external command by setting
the PATH environment variable. Therefore, attackers could run arbitrary
commands with the privileges of group 'bin'.
Workaround
As a temporary workaround, the stmkfont executable can be run without the
sgid 'bin' bit. In order to disable it:
# chmod a-s /usr/bin/stmkfont
Vendor Status:
The vendor (HP-UX) has released a security bulletin
<http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01088>
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01088
regarding this issue, along with patches for vulnerable OS versions.
Note: A valid ITRC account is required for the link above.
Patch IDs:
* PHSS_31990 - HP-UX B.11.23
* PHSS_31989 - HP-UX B.11.22
* PHSS_31988 - HP-UX B.11.11
* PHSS_31987 - HP-UX B.11.00
ADDITIONAL INFORMATION
The information has been provided by <mailto:[email protected]>
NSFOCUS Security Team.
The original article can be found at:
<http://www.nsfocus.com/english/homepage/research/0402.htm>
http://www.nsfocus.com/english/homepage/research/0402.htm
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: [email protected]
In order to subscribe to the mailing list, simply forward this email to: [email protected]
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.