vendor:
Sun/Cobalt RaQ or Qube Systems
by:
Charles Stevenson
7,2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Sun/Cobalt RaQ or Qube Systems
Affected Version From: Cobalt Linux 6.0
Affected Version To: apache-1.3.20-RaQ4_1C3
Patch Exists: YES
Related CWE: N/A
CPE: o:sun:sun_cobalt_raq_or_qube_systems
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002
Sun/Cobalt RaQ or Qube Systems Local Privilege Escalation Vulnerability
Sun has released an advisory warning that it is possible for local users to escalate priveleges on Sun/Cobalt RaQ or Qube systems, by exploiting a vulnerability located in /usr/lib/authenticate. The vulnerability is due to the open() function in the authenticate program, which allows a local user to create a file with world-writable permissions in the current working directory. This can be exploited by a local user to create a malicious cron job, which will be executed with root privileges.
Mitigation:
The vulnerability can be mitigated by changing the permissions of the /usr/lib/authenticate file to 755.