23th May 2002 [SBWID-5363]
COMMAND
Sun rarpd remote and local format strings overflow
SYSTEMS AFFECTED
??
PROBLEM
David evlis reign of DER systems says :
rarpd is a reverse arp protocol for small to medium sized networks. in
the solaris implementation (in.rarpd) there seems to be 3 remotely
exploitable buffer overflows, 2 locally exploitable and 2 cases of
format string exploitability.
In the functions error and syserr (syserr also being used by other in.*
implmentations which are also exploitable, but not the topic of this
advisory today) there contains 2 common syslog calls without format
strings.
static void
syserr(s)
char *s;
{
char buf[256];
(void) sprintf(buf, \"%s: %s\", s, strerror(errno));
(void) fprintf(stderr, \"%s: %s\\n\", cmdname, buf);
syslog(LOG_ERR, buf);
exit(1);
}
/* VARARGS1 */
static void
error(char *fmt, ...)
{
char buf[256];
va_list ap;
va_start(ap, fmt);
(void) vsprintf(buf, fmt, ap);
va_end(ap);
(void) fprintf(stderr, \"%s: %s\\n\", cmdname, buf);
syslog(LOG_ERR, buf);
exit(1);
}
there are two vulnerable calls which could be exploited locally or
remotely.
SOLUTION
Not yet
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH