Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Jul 2001 12:25:03 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-01:
Message-ID:  <5.1.0.14.0.20010710121959.03e50a40@marble.sentex.ca>
In-Reply-To: <200107101402.f6AE2FK63559@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

Does anyone know if there are active exploits out there for this issue ? Is 
it trivial / script kiddie friendly hole ?  Just trying to get a sense of 
how urgent it is to upgrade.

         ---Mike


At 07:02 AM 7/10/01 -0700, FreeBSD Security Advisories wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>=============================================================================
>FreeBSD-SA-01:42                                           Security Advisory
>                                                                 FreeBSD, Inc.
>
>Topic:          signal handling during exec may allow local root
>                 compromise
>
>Category:       core
>Module:         kernel
>Announced:      2001-07-10
>Credits:        Georgi Guninski <guninski@guninski.com>
>Affects:        All released versions of FreeBSD 4.x,
>                 FreeBSD 4.3-STABLE prior to the correction date.
>Corrected:      2001-07-09
>FreeBSD only:   Yes
>
>I.   Background
>
>When a process forks, it inherits the parent's signals.  When the
>process execs, the kernel clears the signal handlers because they are
>not valid in the new address space.
>
>II.  Problem Description
>
>A flaw exists in FreeBSD signal handler clearing that would allow for
>some signal handlers to remain in effect after the exec.  Most of the
>signals were cleared, but some signal hanlders were not.  This allowed
>an attacker to execute arbitrary code in the context of a setuid
>binary.
>
>All versions of 4.x prior to the correction date including and
>4.3-RELEASE are vulnerable to this problem.  The problem has been
>corrected by copying the inherited signal handlers and resetting the
>signals instead of sharing the signal handlers.
>
>III. Impact
>
>Local users may be able to gain increased privileges on the local
>system.
>
>IV.  Workaround
>
>Do not allow untrusted users to gain access to the local system.
>
>V.   Solution
>
>One of the following:
>
>1) Upgrade your vulnerable FreeBSD system to 4.3-STABLE after the
>correction date.
>
>2) To patch your present system: download the relevant patch from the
>below location, and execute the following commands as root:
>
>[FreeBSD 4.1, 4.2, and 4.3 base systems]
>
>This patch has been verified to apply to FreeBSD 4.1, 4.2, and 4.3 only.
>It may or may not apply to older releases.
>
># fetch 
>ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch
># fetch 
>ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch.asc
>
>Verify the detached PGP signature using your PGP utility.
>
># cd /usr/src/sys/kern
># patch -p < /path/to/patch
>
>[ Recompile your kernel as described in
>http://www.freebsd.org/handbook/kernelconfig.html and reboot the
>system ]
>
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.0.6 (FreeBSD)
>Comment: FreeBSD: The Power To Serve
>
>iQCVAwUBO0sBrlUuHi5z0oilAQF4nAP/Wi8RsYGjJQ7NgP/+FwMs8/lekAJ9iEan
>3Ph7xpsFEhJFWhCfrhmM71fMnOwpZ5kijztSOEko7TMRzTtG+dZLKcCKmVg+a1dT
>SJmm2SJp3NE1nlYVqSH1vfVeVcJI5rtAQ33gTPhiL5U26AMr4wep/Elv1p/Shb/D
>CUpueXr6tEE=
>=n74Z
>-----END PGP SIGNATURE-----
>
>To Unsubscribe: send mail to majordomo@FreeBSD.org
>with "unsubscribe freebsd-security" in the body of the message


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20010710121959.03e50a40>