SGI arrayd Authentication Spoofing Remote Privilege Escalation

2005-08-05T08:02:37
ID OSVDB:18762
Type osvdb
Reporter OSVDB
Modified 2005-08-05T08:02:37

Description

Vulnerability Description

arrayd contains a flaw that may allow a malicious user to gain unauthorized access. The issue is triggered when SIMPLE or NONE authentication types are selected, which do not validate the source address of a connection. It is possible that the flaw may allow unauthorized access resulting in a loss of integrity.

Technical Description

From the advisory:

*Note patch 10192 will remove the spoofing vulnerability only if AUTHENTICATION SIMPLE is used.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, SGI has released a patch to address this vulnerability.

Short Description

arrayd contains a flaw that may allow a malicious user to gain unauthorized access. The issue is triggered when SIMPLE or NONE authentication types are selected, which do not validate the source address of a connection. It is possible that the flaw may allow unauthorized access resulting in a loss of integrity.

References:

Vendor Specific Advisory URL Vendor Specific Advisory URL Security Tracker: 1014278 Secunia Advisory ID:16426 Other Advisory URL: ftp://patches.sgi.com/support/free/security/advisories/20050801-01-P.asc Other Advisory URL: http://lsd-pl.net/code/IRIX/irx_arrayd.c Keyword: 20050801-01-P ISS X-Force ID: 21135 ISS X-Force ID: 2367 CVE-1999-0692 CIAC Advisory: J-052 CERT: CA-1999-09