TUCoPS :: Unix :: General :: unix5743.htm

ypxfrd may allow local attacker to read any file on the system.
11th Oct 2002 [SBWID-5743]
COMMAND

	ypxfrd may allow local attacker to read any file on the system.

SYSTEMS AFFECTED

	The following systems are identified as affected by this vulnerability:
	

	 Sun Microsystems Solaris

	 SCO OpenServer

	 Caldera OpenLinux

PROBLEM

	Janusz Niewiadomski of iSEC Security Research [http://isec.pl/] found :
	

	ypxfrd daemon is used for speed up the distribution of  large  NIS  maps
	from NIS master to NIS slave servers.
	

	 Details:

	 ========

	

	When getdbm procedure is called, ypxfrd daemon creates  a  path  to  the
	/var/yp/domain/map file (where domain and map are arguments provided  in
	the  request).  Unfortunately  it  fails  to  check  if  both  arguments
	contains slash or dot characters, thus making databases outside  /var/yp
	directory accessible. A symlink done  can  override  .pag  /  .dir  file
	extension limitation, allowing local attacker to read any  file  on  the
	system.
	

	--snipp--
	

	 Impact:

	 =======

	

	When ypxfrd is configured and running, local attacker is  able  to  read
	any file on the system. As ypxfrd is typically run  as  root,  this  may
	lead to privilege escalation. It is also possible to remotely  read  DBM
	files  outside  /var/yp   directory,   depending   on   the   securenets
	configuration.

SOLUTION

	Please refer to CERT VU#538033 for more information

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH