[prev in list] [next in list] [prev in thread] [next in thread] 

List:       secunia-sec-adv
Subject:    [SA11721] SGI IRIX cpr Arbitrary Library Loading Privilege Escalation Vulnerability
From:       Secunia Security Advisories <sec-adv () secunia ! com>
Date:       2004-05-27 10:16:43
Message-ID: 200405271016.i4RAGh51007585 () secunia ! com
[Download RAW message or body]


TITLE:
SGI IRIX cpr Arbitrary Library Loading Privilege Escalation
Vulnerability

SECUNIA ADVISORY ID:
SA11721

VERIFY ADVISORY:
http://secunia.com/advisories/11721/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
SGI IRIX 6.5.x

DESCRIPTION:
Adam Gowdiak has discovered a vulnerability in IRIX, which can be
exploited by malicious, local users to gain escalated privileges.

The problem is that the /usr/sbin/cpr binary reportedly can be forced
to load a user provided library when restarting the checkpointed
process.

Successful exploitation grants root privileges on a vulnerable
system.

SOLUTION:
Update to version 6.5.25, or install appropriate patches.

IRIX 6.5.20m:
ftp://patches.sgi.com/support/free/security/patches/6.5.20/patch5606.tar

IRIX 6.5.20f:
ftp://patches.sgi.com/support/free/security/patches/6.5.20/patch5607.tar

IRIX 6.5.21:
ftp://patches.sgi.com/support/free/security/patches/6.5.21/patch5608.tar

IRIX 6.5.22:
ftp://patches.sgi.com/support/free/security/patches/6.5.22/patch5609.tar

IRIX 6.5.23:
ftp://patches.sgi.com/support/free/security/patches/6.5.23/patch5609.tar

IRIX 6.5.24:
ftp://patches.sgi.com/support/free/security/patches/6.5.24/patch5610.tar

PROVIDED AND/OR DISCOVERED BY:
Adam Gowdiak

ORIGINAL ADVISORY:
ftp://patches.sgi.com/support/free/security/advisories/20040507-01-P.asc

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=secunia-sec-adv@progressive-comp.com

----------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic