Vulnerability
loadmodule
Affected
SunOs 4.1.x and OpenWindows on all sun4 and Solbourne Computer,
Inc. architectures. The problem does not exists in Solaris 2.x,
Solaris x86, and sun3 architectures. (Openwindows was not
released for the sun3 architecture).
Description
There exists a vulnerability in /usr/etc/modload and
$OPENWIN/bin/loadmodule. This programs can be exploited to
execute a user's program using the effective UID of root. In
SunOS, the LD_* variables are ignored if the program is setuid.
The problem occurs when a setuid program calls a non-setuid
program, and passes the LD_* variable down. The non-setuid
program the interprets the LD_* variables, and faithfully loads
your trojan shared library or module. This is the case with the
'login', 'su' and 'sendmail' LD_* bugs.
Solution
Apply the apropriate Sun patch. For loadmodule the patch is
100448-02, and for modload it is 101200-02. Solbourne systems do
not support the "loadmodule" functionality. This vulnerability
can be fixed on Solbourne systems by removing the setuid bit. The
modload program does not need to be replaced or changed.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH