vendor:
Solaris
by:
horizon
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Solaris
Affected Version From: Solaris 2.5.1
Affected Version To: Solaris 7 (2.7)
Patch Exists: YES
Related CWE: N/A
CPE: o:sun:sun_os:7
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Solaris
2001
Solaris ff.core Utility Vulnerability
There is a vulnerability in Solaris's ff.core utility which allows normal users to execute the rename command as root. This particular bug when leveraged against a series of other configuration issues in a standard Solaris setup can lead to a root compromise. An example of this attack executed via the ff.core rename attack could be as follows: 1. rename /usr/bin/sh /usr/bin/admintool 2. rename /usr/sbin/swmtool /usr/sbin/in.rlogind 3. telnet localhost login and clean up. CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
Mitigation:
Upgrade to the latest version of Solaris and apply the patch provided by the vendor.