|
COMMAND Cray Unicos NQSD format string vulnerability SYSTEMS AFFECTED All versions PROBLEM In Mickey Mouse Hacking Squadron Advisory #1 : The NQS, or Network Queueing System, is a popular batch software processor which is used to perform job control and leveraging in supercomputing environments which require heavy symmetric multi processing. The controlling daemon, which looks like it appears below 37152 ? 0:00 nqsdaemon 57415 ? 0:00 nqsdaemon runs as root in order to properly schedule and timeslice batched process. The Mickey Mouse Hacking Squadron has discovered a format bug vulnerbility by which any unprivileged user on a system running NQS can gain root access. This involves creating a batch with a name that contains special formatting characters, which is processed by an unsafe function taking a variable argument list. In order to exploit this vulnerability, the user must be able to submit the job with qsub in such a way that it triggers this vulnerability. DESCRIPTION The qsub command submits a file that contains a shell script as a batch request to the Network Queuing System (NQS). For an introduction to the use of NQS, see the Network Queuing System (NQS)User\'s Guide, publication SG-2105. This vulnerability has been exploited successfully by the MMHS in a RISC environment, using ALPHA processors, in a way similar to bugs exploited successfully on Digital UNIX by SeungHyun Seo, also posted to the Bugtraq mailing list. The exploitation on vectorized processors, such as the Y-MP series, has proved to be much more difficult, especially due to large 64 bit addressing and a large number of NULL bytes in the process address space. This should also prove easy to exploit on PowerPC and SPARC environments. SOLUTION These products have been retired, and SGI will not be providing a patch for these vulnerabilities. SGI\'s recommendation is to uninstall the product. To determine if the product is installed, run the following command: # versions -b | grep NQE If the output returned by the command looks similar to this: I NQE33015_Client_only 10/28/1999 N Q E 3.3.0.15 Client only I NQE33015_Components_and_Client 10/28/1999 N Q E 3.3.0.15 Components ...then NQE is installed and the system is vulnerable. To uninstall the product, run the following command: # versions remove NQE*