sastcpd Buffer Overflow and Format String Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



----------------------------------------------------------
sastcpd Buffer Overflow and Format String Vulnerabilities 
Ministry-of-Peace - www.ministryofpeace.co.uk             
----------------------------------------------------------

SYNOPSIS

"SAS software provides the foundation, tools, and
solutions for data analysis, report generation,
and enterprise-wide information delivery."

The "SAS Job Spawner", sastcpd, contains both a buffer
overflow and a format string vulnerability.

SAS Support say that these problems were fixed in version
8.2 of this product, but we are unable to confirm as we
do not have access to this version.


IMPACT

sastcpd is installed setuid root by default, and therefore
full root privileges can be obtained through exploitation
of either of these vulnerabilities.


DETAILS

Version tested:
SAS Job Spawner for Open Systems version 8.01

$ sastcpd `perl -e "print 'A' x 1200"`
Invalid argument: AAAA[..cut..]AAAA.
Segmentation fault (core dumped)
$ ls -la core
-rw-------  1 root    teknix     1454382 Jan  28 04:22 core
$ sastcpd %n
Segmentation fault (core dumped)
$ sastcpd %x
Invalid argument: 2.


CREDITS

Vulnerability discovered by Digital Shadow


INFO

Security Advisory #05
Published: 29th January 2002



-- 

_______________________________________________
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup

Win a ski trip!
http://www.nowcode.com/register.asp?affiliate=1net2phone3a



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux