Bugtraq mailing list archives

sastcpd Buffer Overflow and Format String Vulnerabilities


From: "Wodahs Latigid" <wodahs () mail com>
Date: Tue, 29 Jan 2002 09:59:41 +0000

----------------------------------------------------------
sastcpd Buffer Overflow and Format String Vulnerabilities 
Ministry-of-Peace - www.ministryofpeace.co.uk             
----------------------------------------------------------

SYNOPSIS

"SAS software provides the foundation, tools, and
solutions for data analysis, report generation,
and enterprise-wide information delivery."

The "SAS Job Spawner", sastcpd, contains both a buffer
overflow and a format string vulnerability.

SAS Support say that these problems were fixed in version
8.2 of this product, but we are unable to confirm as we
do not have access to this version.


IMPACT

sastcpd is installed setuid root by default, and therefore
full root privileges can be obtained through exploitation
of either of these vulnerabilities.


DETAILS

Version tested:
SAS Job Spawner for Open Systems version 8.01

$ sastcpd `perl -e "print 'A' x 1200"`
Invalid argument: AAAA[..cut..]AAAA.
Segmentation fault (core dumped)
$ ls -la core
-rw-------  1 root    teknix     1454382 Jan  28 04:22 core
$ sastcpd %n
Segmentation fault (core dumped)
$ sastcpd %x
Invalid argument: 2.


CREDITS

Vulnerability discovered by Digital Shadow


INFO

Security Advisory #05
Published: 29th January 2002



-- 

_______________________________________________
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup

Win a ski trip!
http://www.nowcode.com/register.asp?affiliate=1net2phone3a



Current thread: