[prev in list] [next in list] [prev in thread] [next in thread]
List: secunia-sec-adv
Subject: [SA11721] SGI IRIX cpr Arbitrary Library Loading Privilege Escalation Vulnerability
From: Secunia Security Advisories <sec-adv () secunia ! com>
Date: 2004-05-27 10:16:43
Message-ID: 200405271016.i4RAGh51007585 () secunia ! com
[Download RAW message or body]
TITLE:
SGI IRIX cpr Arbitrary Library Loading Privilege Escalation
Vulnerability
SECUNIA ADVISORY ID:
SA11721
VERIFY ADVISORY:
http://secunia.com/advisories/11721/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
SGI IRIX 6.5.x
DESCRIPTION:
Adam Gowdiak has discovered a vulnerability in IRIX, which can be
exploited by malicious, local users to gain escalated privileges.
The problem is that the /usr/sbin/cpr binary reportedly can be forced
to load a user provided library when restarting the checkpointed
process.
Successful exploitation grants root privileges on a vulnerable
system.
SOLUTION:
Update to version 6.5.25, or install appropriate patches.
IRIX 6.5.20m:
ftp://patches.sgi.com/support/free/security/patches/6.5.20/patch5606.tar
IRIX 6.5.20f:
ftp://patches.sgi.com/support/free/security/patches/6.5.20/patch5607.tar
IRIX 6.5.21:
ftp://patches.sgi.com/support/free/security/patches/6.5.21/patch5608.tar
IRIX 6.5.22:
ftp://patches.sgi.com/support/free/security/patches/6.5.22/patch5609.tar
IRIX 6.5.23:
ftp://patches.sgi.com/support/free/security/patches/6.5.23/patch5609.tar
IRIX 6.5.24:
ftp://patches.sgi.com/support/free/security/patches/6.5.24/patch5610.tar
PROVIDED AND/OR DISCOVERED BY:
Adam Gowdiak
ORIGINAL ADVISORY:
ftp://patches.sgi.com/support/free/security/advisories/20040507-01-P.asc
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=secunia-sec-adv@progressive-comp.com
----------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic