The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] SGI IRIX inpview Design Error Vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 16 Jan 2005 10:53:15 +0200
Subject: [UNIX] SGI IRIX inpview Design Error Vulnerability
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050116095925.E158257D7@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  SGI IRIX inpview Design Error Vulnerability
------------------------------------------------------------------------


SUMMARY

The inpview program is "a setuid root application that is included in the 
InPerson networked multimedia conferencing tool. InPerson networked 
multimedia conferencing tool is included in SGI IRIX".

Local exploitation of a design error vulnerability in the inpview command 
included in multiple versions of Silicon Graphics Inc.'s IRIX could allow 
for arbitrary code execution as the root user.

DETAILS

Vulnerable Systems:
 * SGI IRIX version 6.5.9 (feature) and version 6.5.22 (maintenance)

The vulnerability specifically exists due to the fact that inpview trusts 
the user environment and does not drop privileges. When the environment 
variable SUN_TTSESSION_CMD is something such as "cp /bin/jsh 
/tmp/jsh;chmod 6755 /tmp/jsh;killall -9 inpview," the chain of commands 
will be executed with root permissions, thus allowing a regular user to 
drop a setuid and setgid shell to /tmp.

Analysis:
All that is required to exploit this vulnerability is a local account and 
an open X display, which could be the attacker's home machine or another 
compromised system. Exploitation does not require any knowledge of 
application internals, making privilege escalation trivial, even for 
unskilled attackers.

Workaround:
Only allow trusted users local access to security critical systems.

Alternately, remove the setuid bit from inpview:
   chmod u-s /usr/lib/InPerson/inpview

Vendor response:
Support for the InPerson product did not extend beyond 02/2002 as noted in 
the following publication:  
<http://techpubs.sgi.com/library/manuals/4000/007-4526-001/pdf/007-4526-001.pdf>; http://techpubs.sgi.com/library/manuals/4000/007-4526-001/pdf/007-4526-001.pdf

As a result, no patch will be issued for this vulnerability.

Disclosure Timeline:
01/06/2005 - Initial vendor notification
01/07/2005 - Initial vendor response
01/13/2005 - Public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:idlabs-advisories@idefense.com.> iDEFENSE.
The original article can be found at:  
<http://www.idefense.com/application/poi/display?id=182&type=vulnerabilities>; http://www.idefense.com/application/poi/display?id=182&type=vulnerabilities




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру