Skip to comments.
Sun (Solaris) passwd(1) Command Vulnerability (root exploit)
CIAC ^
| March 2, 2004
| CIAC/Sun Microsystems
Posted on 03/05/2004 7:18:31 AM PST by general_re
O-088: Sun passwd(1) Command Vulnerability
[Sun Alert ID: 57454]
March 2, 2004 22:00 GMT
PROBLEM: The passwd command computes the hash of a password typed at run-time or the hash of each password in a list. A vulnerability exists in this command.
PLATFORM: Solaris 8, 9 (SPARC and x86 Platforms)
DAMAGE: A local unprivileged user may be able to gain unauthorized root privileges due to a security issue involving the passwd(1) command.
SOLUTION: Install the security patch.
VULNERABILITY ASSESSMENT: The risk is MEDIUM. A local unprivileged user may be able to gain unauthorized root privileges.
LINKS:
CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-088.shtml
ORIGINAL BULLETIN: Sun Alert ID: 57454 http://www.sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57454&zone_32=category%3Asecurity
[***** Start Sun Alert ID: 57454 *****]
Sun(sm) Alert Notification Sun Alert ID: 57454
Synopsis: Security Vulnerability Involving the passwd(1) Command
Category: Security
Product: Solaris
BugIDs: 4793719
Avoidance: Patch
State: Resolved
Date Released: 26-Feb-2004
Date Closed: 26-Feb-2004
Date Modified:
1. Impact
A local unprivileged user may be able to gain unauthorized root privileges due to a security issue involving the passwd(1) command.
Sun acknowledges, with thanks, Tim Wort (Tim.Wort@InklingResearch.com) for contacting us regarding this issue.
2. Contributing Factors
This issue can occur in the following releases:
SPARC Platform
Solaris 8 with patch 108993-14 through 108993-31 and without patch 108993-32
Solaris 9 without patch 113476-11
x86 Platform
Solaris 8 with patch 108994-14 through 108994-31 and without patch 108994-32
Solaris 9 without patch 114242-07
Note: Solaris 7 is not affected by this issue.
3. Symptoms
There are no reliable symptoms that would show the described issue has been exploited to gain unauthorized elevated privileges to a host.
4. Relief/Workaround
There is no workaround for this issue.
(Excerpt) Read more at ciac.org ...
TOPICS: Miscellaneous; News/Current Events; Technical
KEYWORDS: computersecurity; exploit; lowqualitycrap; root; security; solaris; sun
To: general_re
Huh?
2
posted on
03/05/2004 7:20:03 AM PST
by
EggsAckley
(..................IGNORE the trolls...................it drives them crazy)
To: EggsAckley
I guess you're not running a Sun box ;)
3
posted on
03/05/2004 7:20:48 AM PST
by
general_re
(The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
To: general_re
VULNERABILITY ASSESSMENT: The risk is MEDIUM. A local unprivileged user may be able to gain unauthorized root privileges. This is MEDIUM ??
To: general_re

Thanks for posting this...I'll get right to work on the old girl....
To: EggsAckley
Let's put it in words even a 'rat can understand. passwd is the Unix command for changing passwords. If there's an exploit of passwd, that means a user can theoretically attain "root" status, which, to the non-Unix user, means you control the machine completely. 733t 4Ax0r d00dz getting root on your box is NOT a good thing. root has all the power of Administrator and System accounts on Windows, and more. . .
6
posted on
03/05/2004 7:29:07 AM PST
by
Salgak
(don't mind me: the orbital mind control lasers are making me write this. . .)
To: An.American.Expatriate
I think they reserve "high" for exploits that can be done remotely. In and of itself, this one can't be done non-locally - you'd need a second hole in a second program, one that accepts remote input, to be able to exploit it remotely.
7
posted on
03/05/2004 7:29:47 AM PST
by
general_re
(The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
To: general_re
Bump
8
posted on
03/05/2004 7:31:20 AM PST
by
Fiddlstix
(Tag Lines Repaired While You Wait! Reasonable Prices! Fast Service!)
To: general_re
Anyone with a Mac OSX disk can reset the password on any Mac.
9
posted on
03/05/2004 7:35:10 AM PST
by
js1138
To: general_re
Sounds like this could be series, very series.....
10
posted on
03/05/2004 7:35:42 AM PST
by
blastdad51
(Proud father of an Enduring Freedom vet, and friend of a soldier lost in Afghanistan)
To: general_re
If and when MS is no longer running the vast majority of machines, this sort of vulnerability report will become more and more common. The vulnerabilities already exist, of course, it's just that few hackers are spending any effort to find them; and, when hackers
do cause problems on something like a Sun system, the pool of people affected is small and isolated, so it never makes the news.
I'm often amused by how anti-MS crowd reacts in cases like this -- they greet each security hole as yet further proof of Bill Gates's incompetence (and evilness). Their jihadist glee is actually fun to observe....
11
posted on
03/05/2004 7:38:30 AM PST
by
r9etb
To: js1138
What do you do, boot from the CD and get prompted for a new password?
12
posted on
03/05/2004 7:39:00 AM PST
by
general_re
(The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
To: js1138
Anyone with a Mac OSX disk can reset the password on any Mac. I can do it on Windows too. In common running situations, there is no way from keeping someone with physical access from owning a computer.
To: r9etb
I'm often amused by how anti-MS crowd reacts in cases like this -- they greet each security hole as yet further proof of Bill Gates's incompetence It's just that a lot of Windows security holes are wide-open remote exploits, while *NIX ones tend to be local exploits. I'd expect the number of Windows remote exploits to go down after XP SP2 if Microsoft's rewritten the RPC system as much as it said it has. Even better if you run it on one of the new AMD processors that protect against buffer overflows.
To: r9etb
I try to be an equal-opportunity offender, when possible - I've posted articles on flaws in OS X, Linux, Windows, and now Solaris. Obviously, not all holes are equal, but root access is serious no matter who your favorite racehorse happens to be, and all systems are potentially vulnerable, at least until someone figures out how to guarantee 100% bug-free operating systems. And once those exist, then you have to make sure that all the other code that runs is 100% bug-free, too, or you wind up with
this sort of thing ;)
15
posted on
03/05/2004 7:47:57 AM PST
by
general_re
(The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
To: antiRepublicrat
Your door locks can be picked also, but the locksmith who installed them didn't give the same keys to everyone in town.
The difficulty of hacking into a computer is relative to how much effort went into security. You can easily password the bios and clip off the override jumper pins (or lock the case). That adds a bit of security. The file system can also be encrypted.
So the question is, cn you break in without being detected.
16
posted on
03/05/2004 7:48:33 AM PST
by
js1138
To: general_re
Does this vulnerability affect those who authenticate through Keon?
To: proxy_user
I'm not particularly familiar with Keon - never needed to be - so I couldn't begin to give you much more than an educated guess. I'm always happy to provide those, though - I would guess it's not affected, but for a definitive answer you're probably safer consulting someone who's a bit more up-to-speed on Keon than me ;)
18
posted on
03/05/2004 9:44:32 AM PST
by
general_re
(The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
To: js1138
. . .as can anyone with a UNIX install or boot disk. . .
Boot to single-user mode, delete /etc/shadow, the passwd root. . .
Then again, since Mac OSX **IS** Unix. . .
19
posted on
03/06/2004 8:29:51 PM PST
by
Salgak
(don't mind me: the orbital mind control lasers are making me write this. . .)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson