TUCoPS :: SunOS/Solaris :: sun5363.htm

Sun rarpd remote and local format strings overflow
23th May 2002 [SBWID-5363]
COMMAND

	Sun rarpd remote and local format strings overflow

SYSTEMS AFFECTED

	??

PROBLEM

	David evlis reign of DER systems says :
	

	rarpd is a reverse arp protocol for small to medium sized  networks.  in
	the solaris implementation (in.rarpd)  there  seems  to  be  3  remotely
	exploitable buffer overflows, 2  locally  exploitable  and  2  cases  of
	format string exploitability.
	

	In the functions error and syserr (syserr also being used by other  in.*
	implmentations which are also exploitable, but not  the  topic  of  this
	advisory today) there contains 2  common  syslog  calls  without  format
	strings.
	

	static void

	syserr(s)

	char    *s;

	{

	        char buf[256];

	

	        (void) sprintf(buf, \"%s: %s\", s, strerror(errno));

	        (void) fprintf(stderr, \"%s:  %s\\n\", cmdname, buf);

	        syslog(LOG_ERR, buf);

	        exit(1);

	}

	

	/* VARARGS1 */

	static void

	error(char *fmt, ...)

	{

	        char buf[256];

	        va_list ap;

	

	        va_start(ap, fmt);

	        (void) vsprintf(buf, fmt, ap);

	        va_end(ap);

	        (void) fprintf(stderr, \"%s:  %s\\n\", cmdname, buf);

	        syslog(LOG_ERR, buf);

	        exit(1);

	}

	

	there are two vulnerable calls  which  could  be  exploited  locally  or
	remotely.
	

	

SOLUTION

	Not yet

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH