Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Jul 2001 12:16:20 -0700 (PDT)
From:      FreeBSD Security Advisories <security-advisories@FreeBSD.org>
To:        FreeBSD Security Advisories <security-advisories@FreeBSD.org>
Subject:   FreeBSD Security Advisory FreeBSD-SA-01:42.signal
Message-ID:  <200107111916.f6BJGKD45244@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
FreeBSD-SA-01:42                                           Security Advisory
                                                                FreeBSD, Inc.

Topic:          signal handling during exec may allow local root
                compromise

Category:       core
Module:         kernel
Announced:      2001-07-10
Credits:        Georgi Guninski <guninski@guninski.com>
Affects:        All released versions of FreeBSD 4.x,
                FreeBSD 4.3-STABLE prior to the correction date.
Corrected:      2001-07-09
FreeBSD only:   Yes

I.   Background

When a process forks, it inherits the parent's signals.  When the
process execs, the kernel clears the signal handlers because they are
not valid in the new address space.

II.  Problem Description

A flaw exists in FreeBSD signal handler clearing that would allow for
some signal handlers to remain in effect after the exec.  Most of the
signals were cleared, but some signal hanlders were not.  This allowed
an attacker to execute arbitrary code in the context of a setuid
binary.

All versions of 4.x prior to the correction date including and
4.3-RELEASE are vulnerable to this problem.  The problem has been
corrected by copying the inherited signal handlers and resetting the
signals instead of sharing the signal handlers.

III. Impact

Local users may be able to gain increased privileges on the local
system.

IV.  Workaround

Do not allow untrusted users to gain access to the local system.

V.   Solution

One of the following:

1) Upgrade your vulnerable FreeBSD system to 4.3-STABLE after the
correction date.

2) To patch your present system: download the relevant patch from the
below location, and execute the following commands as root:

[FreeBSD 4.1, 4.2, and 4.3 base systems]

This patch has been verified to apply to FreeBSD 4.1, 4.2, and 4.3 only.
It may or may not apply to older releases.

# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-01:42/signal-4.3.patch.asc

Verify the detached PGP signature using your PGP utility.

# cd /usr/src/sys/kern
# patch -p < /path/to/patch

[ Recompile your kernel as described in
http://www.freebsd.org/handbook/kernelconfig.html and reboot the
system ]

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: FreeBSD: The Power To Serve

iQCVAwUBO0sNtlUuHi5z0oilAQH3aAP/dXzWd8u8Ya9pwOB9ymK3fNQD4GqHaT1b
vKthgZNumVcnoNL3LC/iuMlmufIuVdVXM12ISad+aW5HkqZ0tDFSc4GLA9cX/riN
r66h7IBAOc0p+NQH8TTSjCehUC1Np40hgsca+/onIfhhV7MKGWDY6I6BwJF9UWvD
ZY62Dx/1yI8=
=gDIP
-----END PGP SIGNATURE-----

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security-notifications" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200107111916.f6BJGKD45244>