ID OSVDB:5899 Type osvdb Reporter OSVDB Modified 1995-01-02T00:00:00
Description
Vulnerability Description
SunOS contains a flaw in loadmodule that may allow a malicious local user to gain unauthorized root privileges. The issue is due to the way the loadmodule program fails to sanitize the path environment variable. Sun attempted to patch this by clearing the IFS variable but it can still be exploited by setting the IFS variable twice. This flaw may lead to a loss of Confidentiality and Integrity.
Solution Description
Currently, there are no known workarounds or upgrades to correct this issue. However, Sun Microsystems has released a patch to address this vulnerability.
Short Description
SunOS contains a flaw in loadmodule that may allow a malicious local user to gain unauthorized root privileges. The issue is due to the way the loadmodule program fails to sanitize the path environment variable. Sun attempted to patch this by clearing the IFS variable but it can still be exploited by setting the IFS variable twice. This flaw may lead to a loss of Confidentiality and Integrity.
References:
Vendor Specific Solution URL: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100448&zone_32=100448-03
Vendor Specific Advisory URLRelated OSVDB ID: 5861Related OSVDB ID: 5860
Other Advisory URL: http://www.attrition.org/security/advisory/8lgm/8lgm-23.txt
Mail List Post: http://archives.neohapsis.com/archives/bugtraq/1995_3/0256.html
ISS X-Force ID: 498
CVE-1999-0282CVE-1999-1586
CIAC Advisory: g-02
CERT: CA-1995-12
CERT: CA-1993-18
{"type": "osvdb", "published": "1995-01-02T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:5899", "hashmap": [{"key": "affectedSoftware", "hash": "8a60935bf187cb5b406b94f28ede833a"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "aa7f8c1c95261aadd76af87dec0fa9fa"}, {"key": "cvss", "hash": "cfd16da9581e0c21db590e40dfd9e493"}, {"key": "description", "hash": "f33e42ddb425d1dda75a10801026e846"}, {"key": "href", "hash": "1fe57a5c47614bac8f4c260d3db346e3"}, {"key": "modified", "hash": "c895624c0a57026c7e105b7d38774bb1"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "c895624c0a57026c7e105b7d38774bb1"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "955b328dc7cd615c13af5464c9183464"}, {"key": "title", "hash": "4694686cf0936684769a46db5200b9af"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "bulletinFamily": "software", "cvss": {"vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/", "score": 7.2}, "viewCount": 11, "history": [], "edition": 1, "objectVersion": "1.2", "reporter": "OSVDB", "title": "SunOS loadmodule Double IFS Privilege Escalation", "affectedSoftware": [{"operator": "eq", "version": "4.1.x", "name": "SunOS"}], "enchantments": {"score": {"value": 6.4, "vector": "NONE", "modified": "2017-04-28T13:20:00"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-1999-1586", "CVE-1999-0282"]}, {"type": "osvdb", "idList": ["OSVDB:5860", "OSVDB:5861"]}], "modified": "2017-04-28T13:20:00"}, "vulnersScore": 6.4}, "references": [], "id": "OSVDB:5899", "hash": "07df08dc1053ebb0a0dd0fdafd4ed295f8d6ec3f50d0c78ead603fb3735f4d67", "lastseen": "2017-04-28T13:20:00", "cvelist": ["CVE-1999-1586", "CVE-1999-0282"], "modified": "1995-01-02T00:00:00", "description": "## Vulnerability Description\nSunOS contains a flaw in loadmodule that may allow a malicious local user to gain unauthorized root privileges. The issue is due to the way the loadmodule program fails to sanitize the path environment variable. Sun attempted to patch this by clearing the IFS variable but it can still be exploited by setting the IFS variable twice. This flaw may lead to a loss of Confidentiality and Integrity.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, Sun Microsystems has released a patch to address this vulnerability.\n## Short Description\nSunOS contains a flaw in loadmodule that may allow a malicious local user to gain unauthorized root privileges. The issue is due to the way the loadmodule program fails to sanitize the path environment variable. Sun attempted to patch this by clearing the IFS variable but it can still be exploited by setting the IFS variable twice. This flaw may lead to a loss of Confidentiality and Integrity.\n## References:\nVendor Specific Solution URL: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100448&zone_32=100448-03\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/114&type=0&nav=sec.sba)\n[Related OSVDB ID: 5861](https://vulners.com/osvdb/OSVDB:5861)\n[Related OSVDB ID: 5860](https://vulners.com/osvdb/OSVDB:5860)\nOther Advisory URL: http://www.attrition.org/security/advisory/8lgm/8lgm-23.txt\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/1995_3/0256.html\nISS X-Force ID: 498\n[CVE-1999-0282](https://vulners.com/cve/CVE-1999-0282)\n[CVE-1999-1586](https://vulners.com/cve/CVE-1999-1586)\nCIAC Advisory: g-02\nCERT: CA-1995-12\nCERT: CA-1993-18\n"}
{"cve": [{"lastseen": "2019-05-29T18:07:36", "bulletinFamily": "NVD", "description": "loadmodule in SunOS 4.1.x, as used by xnews, does not properly sanitize its environment, which allows local users to gain privileges, a different vulnerability than CVE-1999-1584.", "modified": "2017-07-11T01:29:00", "id": "CVE-1999-1586", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1586", "published": "1999-12-31T05:00:00", "title": "CVE-1999-1586", "type": "cve", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:07:35", "bulletinFamily": "NVD", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1584, CVE-1999-1586. Reason: This candidate combined references from one issue with the description from another issue. Notes: Users should consult CVE-1999-1584 and CVE-1999-1586 to obtain the appropriate name. All references and descriptions in this candidate have been removed to prevent accidental usage.", "modified": "2008-09-09T12:34:00", "id": "CVE-1999-0282", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0282", "published": "1997-09-23T04:00:00", "title": "CVE-1999-0282", "type": "cve", "cvss": {"score": 0.0, "vector": "NONE"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:00", "bulletinFamily": "software", "description": "## Vulnerability Description\nSunOS version 4.1.x contains a flaw in loadmodule that may allow a malicious local user to gain unauthorized root privileges. The issue is due to the way the loadmodule program fails to sanitize the path environment variable. This flaw may lead to a loss of Confidentiality and Integrity.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, Sun Microsystems has released a patch to address this vulnerability.\n## Short Description\nSunOS version 4.1.x contains a flaw in loadmodule that may allow a malicious local user to gain unauthorized root privileges. The issue is due to the way the loadmodule program fails to sanitize the path environment variable. This flaw may lead to a loss of Confidentiality and Integrity.\n## Manual Testing Notes\n$ set path=(. $path)\n$ echo \"/bin/sh\" > ld\n$ chmod 711 ld\n$ /usr/openwin/loadmodule sd.o evqload\n# whoami\n\n## References:\nVendor Specific Solution URL: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100448&zone_32=100448-03\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/114&type=0&nav=sec.sba)\n[Related OSVDB ID: 5861](https://vulners.com/osvdb/OSVDB:5861)\n[Related OSVDB ID: 5899](https://vulners.com/osvdb/OSVDB:5899)\nISS X-Force ID: 498\n[CVE-1999-0282](https://vulners.com/cve/CVE-1999-0282)\n[CVE-1999-1586](https://vulners.com/cve/CVE-1999-1586)\nCIAC Advisory: g-02\nCERT: CA-1995-12\nCERT: CA-1993-18\n", "modified": "1995-01-02T00:00:00", "published": "1995-01-02T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:5860", "id": "OSVDB:5860", "type": "osvdb", "title": "SunOS loadmodule Path Environment Privilege Escalation", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-04-28T13:20:00", "bulletinFamily": "software", "description": "## Vulnerability Description\nSun Microsystems SunOS contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when an error in the modload program related to environment variables occurs. This flaw may lead to an escliation of user privledges.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, Sun Microsystems has released a patch '101200-02' to address this vulnerability.\n## Short Description\nSun Microsystems SunOS contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when an error in the modload program related to environment variables occurs. This flaw may lead to an escliation of user privledges.\n## References:\nVendor Specific Solution URL: http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=101200&rev=02\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/124&type=0&nav=sec.sba)\n[Related OSVDB ID: 5860](https://vulners.com/osvdb/OSVDB:5860)\nISS X-Force ID: 551\n[CVE-1999-0282](https://vulners.com/cve/CVE-1999-0282)\n[CVE-1999-1584](https://vulners.com/cve/CVE-1999-1584)\nCIAC Advisory: g-02\nCERT: CA-1993-18\n", "modified": "1993-12-01T00:00:00", "published": "1993-12-01T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:5861", "id": "OSVDB:5861", "type": "osvdb", "title": "SunOS modload Root Privilege Escalation", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}