vendor:
UnixWare
by:
Brock Tellier
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: UnixWare
Affected Version From: UnixWare 7.1
Affected Version To: UnixWare 7.1
Patch Exists: YES
Related CWE: N/A
CPE: o:novell:unixware_7.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: UnixWare
2000
UnixWare 7.1 /usr/sbin/pkginstall exploit
It is possible to view the entries in /etc/shadow through exploiting a buffer overflow in pkgcat and pkginstall. Though neither of these binaries are setuid, the dacread permissions which are granted in /etc/security/tcb/privs give them the ability read /etc/shadow. When the oversized buffer data is passed to the programs as argv[1], the stack will be corrupted and it is possible to spawn a program which would "cat" /etc/shadow with the dacread privs.
Mitigation:
Apply the patch provided by the vendor or upgrade to the latest version of the software.