The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] SGI IRIX gr_osview Multiple Vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 10 Apr 2005 17:58:55 +0200
Subject: [UNIX] SGI IRIX gr_osview Multiple Vulnerabilities
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050410154738.0C5E857C6@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  SGI IRIX gr_osview Multiple Vulnerabilities
------------------------------------------------------------------------


SUMMARY

The gr_osview application is a setuid root application that provides a 
graphical display of usage of certain types of operating system resources. 
Local exploitation of a file overwrite vulnerability in the gr_osview 
command included in multiple versions of Silicon Graphics Inc.'s IRIX 
operating system could allow for the overwriting of arbitrary files, 
regardless of permissions. gr_osview is also vulnerable to sensitive 
information disclosure.

DETAILS

Vulnerable Systems:
 * iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX 
version 6.5.22 (maintenance). It is suspected that previous and later 
versions of both the feature and maintenance revisions of IRIX 6.5 are 
also vulnerable. The gr_osview is installed by default under multiple 
versions of IRIX 6.

Arbitrary File Overwrite Vulnerability:
The vulnerability specifically exists in the way that gr_osview opens user 
specified files without dropping privileges. When a file is specified 
using the "-s" option, it will be opened regardless of permissions, and 
operating system usage information will be written into it.

CVE Information:
The Common Vulnerabilities and Exposures (CVE) project has assigned the 
names  <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0465>; 
CAN-2005-0465  
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0464>; 
CAN-2005-0464 to these issues. This is a candidate for inclusion in the 
CVE list (http://cve.mitre.org), which standardizes names for security 
problems.

Example:
user@irix$ gr_osview -s /etc/shadow 
After execution of that command, the system shadow file will be 
overwritten with system usage information. With a damaged shadow file, 
users will no longer be able to log on remotely or locally.

This vulnerability has been addressed in SGI BUG 930890.

Information Disclosure Vulnerability:
The vulnerability specifically exists in the way that gr_osview opens 
user-specified description files without dropping privileges. When this is 
combined with the debug option, it is possible to dump a line from an 
arbitrary file, regardless of its protection. An example is as follows:

user@irix$ gr_osview -d -D /etc/shadow
sgets: waiting for string
*SR> read <root:PASSWDHASHHERE:2051::::::>
gr_osview: description file format error on line 1   

To elevate privileges, the attacker would then have to crack the root 
password using the acquired hash.

This vulnerability has been addressed in SGI BUG 930892.

All that is required to exploit these vulnerabilities is a local account 
and an open X display, which could be the attacker's home machine or 
another compromised computer. Exploitation does not require any knowledge 
of application internals, making exploitation trivial, even for unskilled 
attackers.

Workaround:
Only allow trusted users local access to security-critical systems. 
Alternately, remove the setuid bit from inpview using:
chmod u-s /usr/sbin/gr_osview

Vendor Status:
Related security advisories are available at:  
<http://www.sgi.com/support/security/advisories.html>; 
http://www.sgi.com/support/security/advisories.html

Related patches are available at:
 <http://www.sgi.com/support/security/patches.html>; 
http://www.sgi.com/support/security/patches.html
 <ftp://patches.sgi.com/support/free/security/patches/>; 
ftp://patches.sgi.com/support/free/security/patches/

Disclosure Timeline:
02/18/2005 - Initial vendor notification
02/23/2005 - Initial vendor response
04/07/2005 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by  
<mailto:idlabs-advisories@idefense.com.> iDEFENSE.
The original article can be found at:  
<http://www.idefense.com/application/poi/display?id=225&type=vulnerabilities>; http://www.idefense.com/application/poi/display?id=225&type=vulnerabilities
And:  
<http://www.idefense.com/application/poi/display?id=226&type=vulnerabilities>; http://www.idefense.com/application/poi/display?id=226&type=vulnerabilities




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру