Vulnwatch mailing list archives
Immunity Advisory: Solaris kernel loading fun
From: Dave Aitel <dave () immunitysec com>
Date: Tue, 23 Mar 2004 16:57:43 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Immunity Research has released an Advisory from the Vulnerability Sharing Club into the public domain. This advisory can be found at http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf Technical Summary: There is a vulnerability in Solaris that allows local users to load kernel modules without being root. This is handy for getting around things like Argus Pitbull (if it still existed) or Okena or Entercept or anything like that, or simply for just taking root. An exploit for this was released as part of the Shellcoder's Handbook. There is a Solaris patch that appears to make this exploit ineffective. http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57479&zone_32=category%3Asecurity Dave Aitel Immunity, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFAYLLXzOrqAtg8JS8RAlFAAJ9J1/EkfleCMDn8T+qFWZqLah1OHACfQRlV yCWiZdoCR8RgGylAjdrC4/w= =Bm2x -----END PGP SIGNATURE-----
Current thread:
- Immunity Advisory: Solaris kernel loading fun Dave Aitel (Mar 23)