TUCoPS :: SunOS/Solaris :: loadmod.htm

SunOS loadmodule vulnerability
Vulnerability

    loadmodule

Affected

    SunOs 4.1.x and  OpenWindows on all  sun4 and Solbourne  Computer,
    Inc. architectures. The  problem does not  exists in Solaris  2.x,
    Solaris  x86,  and  sun3  architectures.   (Openwindows  was   not
    released for the sun3 architecture).

Description

    There   exists   a    vulnerability   in   /usr/etc/modload    and
    $OPENWIN/bin/loadmodule.  This  programs   can  be  exploited   to
    execute  a  user's  program  using  the  effective UID of root. In
    SunOS, the LD_*  variables are ignored  if the program  is setuid.
    The  problem  occurs  when  a  setuid  program  calls a non-setuid
    program,  and  passes  the  LD_*  variable  down.  The  non-setuid
    program the  interprets the  LD_* variables,  and faithfully loads
    your trojan shared  library or module.  This is the  case with the
    'login', 'su' and 'sendmail' LD_* bugs.

Solution

    Apply  the  apropriate  Sun patch.  For  loadmodule  the  patch is
    100448-02, and for modload  it is 101200-02. Solbourne  systems do
    not  support  the  "loadmodule"  functionality. This vulnerability
    can be fixed on Solbourne systems by removing the setuid bit.  The
    modload program does not need to be replaced or changed.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH