Skip to main content

Digital Unix MSGCHK Buffer Overflow Vulnerability

posted onSeptember 12, 2001
by hitbsecnews

The msgchk utility under certain versions of Digital Unix contains a buffer overflow vulnerability which could yield root privilege.

If a local user invokes the msgchk utility at the command line, argumented with a sufficiently long string of bytes, a buffer overflow condition can be triggered. Where msgchk runs suid root, this can allow hostile code to be executed as root, granting an attacker administrative access to the vulnerable system.

L33tdawg: The list of vulnerable machines as well as the fix for the problem is attached. bugtraq id 3311
object msgchk (exec)
class Boundary Condition Error
cve CVE-MAP-NOMATCH
remote No
local Yes
published September 10, 2001
updated September 10, 2001
vulnerable Digital (Compaq) TRU64/DIGITAL UNIX 4.0g
Digital (Compaq) TRU64/DIGITAL UNIX 4.0f
Digital (Compaq) TRU64/DIGITAL UNIX 4.0e
Digital (Compaq) TRU64/DIGITAL UNIX 4.0d

Solution: Temporary workaround: Unless msgchk must be run suid, (ie for support of "rpop"), strip the suid bit (chmod u-s /usr/bin/mh/msgchk)

Source

Tags

Networking

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th