Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Janusz Niewiadomski (funkysh_at_isec.pl)
Date: Thu Oct 10 2002 - 11:39:26 CDT
-----BEGIN PGP SIGNED MESSAGE-----
Version: read the details
CERT vulnerability note: http://www.kb.cert.org/vuls/id/538033
Author: Janusz Niewiadomski <funkyshisec.pl>
Date: October 10, 2002
Improper arguments validation in ypxfrd may allow local attacker to read
any file on the system.
ypxfrd daemon is used for speed up the distribution of large NIS maps
from NIS master to NIS slave servers.
When getdbm procedure is called, ypxfrd daemon creates a path to the
/var/yp/domain/map file (where domain and map are arguments provided
in the request). Unfortunately it fails to check if both arguments
contains slash or dot characters, thus making databases outside
/var/yp directory accessible. A symlink done can override .pag / .dir
file extension limitation, allowing local attacker to read any file on
The vendors was notified on August 27, 2002. The following systems are
identified as affected by this vulnerability:
Sun Microsystems Solaris
When ypxfrd is configured and running, local attacker is able to read any
file on the system. As ypxfrd is typically run as root, this may lead to
privilege escalation. It is also possible to remotely read DBM files
outside /var/yp directory, depending on the securenets configuration.
Please refer to CERT VU#538033 for more information.
iSEC Security Research
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
-----END PGP SIGNATURE-----