Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Sun (Solaris) passwd(1) Command Vulnerability (root exploit)
CIAC ^ | March 2, 2004 | CIAC/Sun Microsystems

Posted on 03/05/2004 7:18:31 AM PST by general_re

O-088: Sun passwd(1) Command Vulnerability
[Sun Alert ID: 57454]
March 2, 2004 22:00 GMT

PROBLEM: The passwd command computes the hash of a password typed at run-time or the hash of each password in a list. A vulnerability exists in this command.

PLATFORM: Solaris 8, 9 (SPARC and x86 Platforms)

DAMAGE: A local unprivileged user may be able to gain unauthorized root privileges due to a security issue involving the passwd(1) command.

SOLUTION: Install the security patch.

VULNERABILITY ASSESSMENT: The risk is MEDIUM. A local unprivileged user may be able to gain unauthorized root privileges.

LINKS:

CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-088.shtml
ORIGINAL BULLETIN: Sun Alert ID: 57454 http://www.sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57454&zone_32=category%3Asecurity

[***** Start Sun Alert ID: 57454 *****]

Sun(sm) Alert Notification Sun Alert ID: 57454
Synopsis: Security Vulnerability Involving the passwd(1) Command
Category: Security
Product: Solaris
BugIDs: 4793719
Avoidance: Patch
State: Resolved
Date Released: 26-Feb-2004
Date Closed: 26-Feb-2004
Date Modified:

1. Impact

A local unprivileged user may be able to gain unauthorized root privileges due to a security issue involving the passwd(1) command.

Sun acknowledges, with thanks, Tim Wort (Tim.Wort@InklingResearch.com) for contacting us regarding this issue.

2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform

Solaris 8 with patch 108993-14 through 108993-31 and without patch 108993-32
Solaris 9 without patch 113476-11

x86 Platform

Solaris 8 with patch 108994-14 through 108994-31 and without patch 108994-32
Solaris 9 without patch 114242-07

Note: Solaris 7 is not affected by this issue.

3. Symptoms

There are no reliable symptoms that would show the described issue has been exploited to gain unauthorized elevated privileges to a host.

4. Relief/Workaround

There is no workaround for this issue.

(Excerpt) Read more at ciac.org ...


TOPICS: Miscellaneous; News/Current Events; Technical
KEYWORDS: computersecurity; exploit; lowqualitycrap; root; security; solaris; sun

1 posted on 03/05/2004 7:18:33 AM PST by general_re
[ Post Reply | Private Reply | View Replies]

To: general_re
Huh?
2 posted on 03/05/2004 7:20:03 AM PST by EggsAckley (..................IGNORE the trolls...................it drives them crazy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: EggsAckley
I guess you're not running a Sun box ;)
3 posted on 03/05/2004 7:20:48 AM PST by general_re (The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
[ Post Reply | Private Reply | To 2 | View Replies]

To: general_re
VULNERABILITY ASSESSMENT: The risk is MEDIUM. A local unprivileged user may be able to gain unauthorized root privileges.

This is MEDIUM ??

4 posted on 03/05/2004 7:23:26 AM PST by An.American.Expatriate
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re

Thanks for posting this...I'll get right to work on the old girl....

5 posted on 03/05/2004 7:26:52 AM PST by sirshackleton
[ Post Reply | Private Reply | To 1 | View Replies]

To: EggsAckley
Let's put it in words even a 'rat can understand. passwd is the Unix command for changing passwords. If there's an exploit of passwd, that means a user can theoretically attain "root" status, which, to the non-Unix user, means you control the machine completely. 733t 4Ax0r d00dz getting root on your box is NOT a good thing. root has all the power of Administrator and System accounts on Windows, and more. . .
6 posted on 03/05/2004 7:29:07 AM PST by Salgak (don't mind me: the orbital mind control lasers are making me write this. . .)
[ Post Reply | Private Reply | To 2 | View Replies]

To: An.American.Expatriate
I think they reserve "high" for exploits that can be done remotely. In and of itself, this one can't be done non-locally - you'd need a second hole in a second program, one that accepts remote input, to be able to exploit it remotely.
7 posted on 03/05/2004 7:29:47 AM PST by general_re (The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
[ Post Reply | Private Reply | To 4 | View Replies]

To: general_re
Bump
8 posted on 03/05/2004 7:31:20 AM PST by Fiddlstix (Tag Lines Repaired While You Wait! Reasonable Prices! Fast Service!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
Anyone with a Mac OSX disk can reset the password on any Mac.
9 posted on 03/05/2004 7:35:10 AM PST by js1138
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
Sounds like this could be series, very series.....
10 posted on 03/05/2004 7:35:42 AM PST by blastdad51 (Proud father of an Enduring Freedom vet, and friend of a soldier lost in Afghanistan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
If and when MS is no longer running the vast majority of machines, this sort of vulnerability report will become more and more common. The vulnerabilities already exist, of course, it's just that few hackers are spending any effort to find them; and, when hackers do cause problems on something like a Sun system, the pool of people affected is small and isolated, so it never makes the news.

I'm often amused by how anti-MS crowd reacts in cases like this -- they greet each security hole as yet further proof of Bill Gates's incompetence (and evilness). Their jihadist glee is actually fun to observe....

11 posted on 03/05/2004 7:38:30 AM PST by r9etb
[ Post Reply | Private Reply | To 7 | View Replies]

To: js1138
What do you do, boot from the CD and get prompted for a new password?
12 posted on 03/05/2004 7:39:00 AM PST by general_re (The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
[ Post Reply | Private Reply | To 9 | View Replies]

To: js1138
Anyone with a Mac OSX disk can reset the password on any Mac.

I can do it on Windows too. In common running situations, there is no way from keeping someone with physical access from owning a computer.

13 posted on 03/05/2004 7:40:33 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 9 | View Replies]

To: r9etb
I'm often amused by how anti-MS crowd reacts in cases like this -- they greet each security hole as yet further proof of Bill Gates's incompetence

It's just that a lot of Windows security holes are wide-open remote exploits, while *NIX ones tend to be local exploits. I'd expect the number of Windows remote exploits to go down after XP SP2 if Microsoft's rewritten the RPC system as much as it said it has. Even better if you run it on one of the new AMD processors that protect against buffer overflows.

14 posted on 03/05/2004 7:46:43 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 11 | View Replies]

To: r9etb
I try to be an equal-opportunity offender, when possible - I've posted articles on flaws in OS X, Linux, Windows, and now Solaris. Obviously, not all holes are equal, but root access is serious no matter who your favorite racehorse happens to be, and all systems are potentially vulnerable, at least until someone figures out how to guarantee 100% bug-free operating systems. And once those exist, then you have to make sure that all the other code that runs is 100% bug-free, too, or you wind up with this sort of thing ;)
15 posted on 03/05/2004 7:47:57 AM PST by general_re (The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
[ Post Reply | Private Reply | To 11 | View Replies]

To: antiRepublicrat
Your door locks can be picked also, but the locksmith who installed them didn't give the same keys to everyone in town.

The difficulty of hacking into a computer is relative to how much effort went into security. You can easily password the bios and clip off the override jumper pins (or lock the case). That adds a bit of security. The file system can also be encrypted.

So the question is, cn you break in without being detected.
16 posted on 03/05/2004 7:48:33 AM PST by js1138
[ Post Reply | Private Reply | To 13 | View Replies]

To: general_re
Does this vulnerability affect those who authenticate through Keon?
17 posted on 03/05/2004 8:54:09 AM PST by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
I'm not particularly familiar with Keon - never needed to be - so I couldn't begin to give you much more than an educated guess. I'm always happy to provide those, though - I would guess it's not affected, but for a definitive answer you're probably safer consulting someone who's a bit more up-to-speed on Keon than me ;)
18 posted on 03/05/2004 9:44:32 AM PST by general_re (The doors to Heaven and Hell are adjacent and identical... - Nikos Kazantzakis)
[ Post Reply | Private Reply | To 17 | View Replies]

To: js1138
. . .as can anyone with a UNIX install or boot disk. . .

Boot to single-user mode, delete /etc/shadow, the passwd root. . .

Then again, since Mac OSX **IS** Unix. . .
19 posted on 03/06/2004 8:29:51 PM PST by Salgak (don't mind me: the orbital mind control lasers are making me write this. . .)
[ Post Reply | Private Reply | To 9 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson