A remotely exploitable vulnerability exists in Cobalt RaQ Server Appliances with the Security Hardening Package (SHP) installed.
The Cobalt RaQ``TM``4 is a server appliance that provides a dedicated Web-hosting platform and offers new capabilities for high-traffic, complex Web sites and e-commerce applications.
The RaQ 4 server appliance offers a full suite of Internet services with remote administration capabilities, pre-packaged in a single rack-unit (1RU) industry-standard enclosure. The RaQ 4 is pre-configured with Apache Web server, Sendmail, File Transfer Protocol (FTP) server, Domain Name System (DNS), the Linux operating system, FrontPage Server extensions, and support for Active Server Pages (ASP), PHP and common gateway interface (CGI) scripts.
Sun provides the SHP for Cobalt RaQs. Although it is not installed by default, many users install the SHP. Quoting from the SHP RaQ 4 User Guide:
Security Functions include:
• Scan detection, logging, and lockout
• Buffer overflow protection
• Root privilege control
A remotely exploitable vulnerability in the SHP may allow a remote attacker to execute arbitrary code on a Cobalt RaQ Server Appliance. The vulnerability occurs in a cgi script that does not properly filter input. Specifically,
overflow.cgi does not adequately filter input destined for the
overflow.cgi, which will allow the command the attacker filled the
A remote attacker may be able to execute arbitrary code on a Cobalt RaQ Server Appliance with the SHP installed.
Apply a patch. This patch will remove the SHP from your RaQ.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: December 11, 2002
Sun confirms that a remote root exploit does affect the Sun/Cobalt RaQ4 platform if the SHP (Security Hardening Patch) patch was installed.
Sun has released a Sun Alert which describes how to remove the SHP patch:
The removal patch is available from:
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This vulnerability was publicly reported by .
This document was written by Ian A Finlay.
CVE IDs:* | CVE-2002-1361
CERT Advisory: | CA-2002-35
**Severity Metric: | 41.63
*Date Public: | 2002-12-05
Date First Published: | 2002-12-11
Date Last Updated: | 2002-12-16 15:52 UTC
Document Revision: | 67