exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

iDEFENSE Security Advisory 2003-09-16.t

iDEFENSE Security Advisory 2003-09-16.t
Posted Sep 16, 2003
Authored by iDefense Labs, Mark Zielinski | Site idefense.com

iDEFENSE Security Advisory 09.16.03: An exploit has surfaced that allows remote attackers to execute arbitrary commands with super-user privileges against Solaris hosts running the default RPC authentication scheme in Solstice AdminSuite, sadmind. CVE Related Number: CVE-2003-0722.

tags | advisory, remote, arbitrary
systems | solaris
SHA-256 | 927d8400a78249ccc1f470ef0d7fa5b3ce3bc5fe19fbd3027a63dae9bae28365

iDEFENSE Security Advisory 2003-09-16.t

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 09.16.03:
https://www.idefense.com/advisory/09.16.03.txt
Remote Root Exploitation of Default Solaris sadmind Setting
September 16, 2003

I. BACKGROUND

Solstice AdminSuite is a set of tools packaged by Sun Microsystems Inc.
in its Solaris operating system to help administrators manage systems
remotely, centralize configuration information and monitor software
usage. The sadmind daemon is used by Solstice AdminSuite applications
to perform these distributed system administration operations. The
sadmind daemon is typically installed and enabled in a default Solaris
installation.

II. DESCRIPTION

An exploit has surfaced that allows remote attackers to execute
arbitrary commands with super-user privileges against Solaris hosts
running the default RPC authentication scheme in Solstice AdminSuite.
This weakness is documented to some extent in Sun documentation,
https://docs.sun.com/db/doc/816-0211/6m6nc676b?a=view .

By sending a sequence of specially crafted Remote Procedure Call (RPC)
requests to the sadmind daemon, an attacker can exploit this
vulnerability to gain unauthorized root access to a vulnerable system.
The sadmind daemon defaults to weak authentication (AUTH_SYS), making
it possible for a remote attacker to send a sequence of specially
crafted RPC packets to forge the client identity.

After the identity has been successfully forged, the attacker can
invoke a feature within the daemon itself to execute a shell as root
or, depending on the forged credential, any other valid user of the
system. The daemon will execute the program of the attacker’s choice;
for example, spawning a reverse-network shell back to the attacker for
input/output control. Under certain circumstances, a reverse-network
shell could allow for the attacker to bypass firewalls and/or filters.

III. ANALYSIS

Because the nature of the weakness exists on the application level,
successful exploitation does not require the use of machine-specific
code, nor does it require any previous knowledge of the target's
architecture. Therefore, any local or remote attacker could execute
commands as root on a vulnerable system running the sadmind service. By
default, sadmind is installed and started at system boot time on most
default and fully patched installations of Solaris. While many other
vendors rely on SUNRPC related routines from Sun, this design issue is
confined to Sun's sadmind authentication implementation in Solaris.
The most inherent threat is if this exploit becomes packaged into a
cross-platform worm were it to become publicly available.

IV. DETECTION

An exploit has been obtained and demonstrated in real-world conditions
on systems running Solaris or Trusted Solaris operating systems running
sadmind. Default installations of SunOS 5.3 thru 5.9 (Solaris 2.x, 7,
8, 9) on both the SPARC and _x86 platforms are susceptible. In
addition, versions 7 and 8 of Trusted Solaris on both the SPARC and
_x86 platforms are susceptible to exploitation. Exploitation occurs
through an initial request through UDP or TCP port 111 (sunrpc).

V. WORKAROUNDS

For Solaris hosts that do not require the Solstice AdminSuite related
services, disable the sadmind service by commenting out the appropriate
line in /etc/inetd.conf. Make sure to restart inetd after changing
this file (e.g. pkill -HUP inetd).

For networks, ensure proper ingress filters are in place on the
Internet router and firewall, especially on TCP and UDP port 111.

For Solaris hosts that require the Solstice AdminSuite to be running,
the authentication security settings of sadmind should be increased to
STRONG (AUTH_DES) — this is not the default setting. This setting also
requires the creation of NIS or NIS+ DES keys to have been created for
each Solaris user and each host.

In order to upgrade the authentication setting, the sadmind line in
/etc/inetd.conf should be changed to look like the following:

100232/10 tli rpc/udp wait root /usr/sbin/sadmind sadmind -S 2

Sun also recommends using the Solaris Security Toolkit (JASS) to harden
a Solaris system, https://wwws.sun.com/software/security/jass/ .

VI. VENDOR RESPONSE

Sun does not plan on releasing a patch for this issue. Because a
working exploit now exists for this issue, Sun Microsystems Inc. is
issuing Alert 56740 to ensure administrators have proactively applied
the proper workarounds in the event this exploit or one like it becomes
publicly available. Sun's alert is available at
https://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F56740 .

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
has assigned CAN-2003-0722 to this issue.

VIII. DISCLOSURE TIMELINE

26 AUG 2003 Exploit acquired by iDEFENSE
26 AUG 2003 Sun notified (security-alert@sun.com)
27 AUG 2003 Followup status request via phone
27 AUG 2003 Response from Derrick Scholl, Sun Security
Coordination Team
02 SEP 2003 iDEFENSE clients notified
16 SEP 2003 Coordinated Public Disclosure

IX. CREDIT

Mark Zielinski (markzielinski@mailblocks.com) is credited with this
discovery.


Get paid for security research
https://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to listserv@idefense.com, subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world - from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide
decision-makers, frontline security professionals and network
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit https://www.idefense.com .


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.2

iQA/AwUBP2cHuvrkky7kqW5PEQIywQCdE+ebPkgFjt9zL/uFig1zIWLM+JUAoLps
RC5Mn1cqMq4xqdONWy1EnbP0
=083t
-----END PGP SIGNATURE-----

To stop receiving iDEFENSE Security Advisories, reply to this message and put "unsubscribe" in the subject.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close