[DER Adv #7] - Multiple Vulnerabilities in solaris in.rarpd

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Intro:
rarpd is a reverse arp protocol for small to medium sized networks.
in the solaris implementation (in.rarpd) there seems to be 3 remotely 
exploitable buffer overflows, 2 locally exploitable and 2 cases of format 
string exploitability.

Details:
In the functions error and syserr (syserr also being used by other in.* 
implmentations which are also exploitable, but not the topic of this 
advisory today) there contains 2 common syslog calls without format strings.

static void
syserr(s)
char    *s;
{
        char buf[256];

        (void) sprintf(buf, "%s: %s", s, strerror(errno));
        (void) fprintf(stderr, "%s:  %s\n", cmdname, buf);
        syslog(LOG_ERR, buf);
        exit(1);
}

/* VARARGS1 */
static void
error(char *fmt, ...)
{
        char buf[256];
        va_list ap;

        va_start(ap, fmt);
        (void) vsprintf(buf, fmt, ap);
        va_end(ap);
        (void) fprintf(stderr, "%s:  %s\n", cmdname, buf);
        syslog(LOG_ERR, buf);
        exit(1);
}

there are two vulnerable calls which could be exploited locally or remotely.

vendor notification: nope

a working exploit has been created for the remote buffer overflows but not 
this time, not here.

DER systems

_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux