<<< Date Index >>>     <<< Thread Index >>>

iDEFENSE Security Advisory 09.16.03: Remote Root Exploitation of Default Solaris sadmind Setting



The original posting had a bad signature.

David Mirza Ahmad
Symantec

PGP: 0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB  AB F0 1E 67 C6 1A 26 00 57 12
--
The battle for the past is for the future.
We must be the winners of the memory war.
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1



iDEFENSE Security Advisory 09.16.03:

http://www.idefense.com/advisory/09.16.03.txt

Remote Root Exploitation of Default Solaris sadmind Setting

September 16, 2003



I. BACKGROUND



Solstice AdminSuite is a set of tools packaged by Sun Microsystems Inc.

in its Solaris operating system to help administrators manage systems

remotely, centralize configuration information and monitor software

usage.  The sadmind daemon is used by Solstice AdminSuite applications

to perform these distributed system administration operations.  The

sadmind daemon is typically installed and enabled in a default Solaris

installation.



II. DESCRIPTION



An exploit has surfaced that allows remote attackers to execute

arbitrary commands with super-user privileges against Solaris hosts

running the default RPC authentication scheme in Solstice AdminSuite. 

This weakness is documented to some extent in Sun documentation,

http://docs.sun.com/db/doc/816-0211/6m6nc676b?a=view .



By sending a sequence of specially crafted Remote Procedure Call (RPC)

requests to the sadmind daemon, an attacker can exploit this

vulnerability to gain unauthorized root access to a vulnerable system.

The sadmind daemon defaults to weak authentication (AUTH_SYS), making

it possible for a remote attacker to send a sequence of specially

crafted RPC packets to forge the client identity. 



After the identity has been successfully forged, the attacker can

invoke a feature within the daemon itself to execute a shell as root

or, depending on the forged credential, any other valid user of the

system. The daemon will execute the program of the attacker?s choice;

for example, spawning a reverse-network shell back to the attacker for

input/output control. Under certain circumstances, a reverse-network

shell could allow for the attacker to bypass firewalls and/or filters. 



III. ANALYSIS



Because the nature of the weakness exists on the application level,

successful exploitation does not require the use of machine-specific

code, nor does it require any previous knowledge of the target's

architecture. Therefore, any local or remote attacker could execute

commands as root on a vulnerable system running the sadmind service. By

default, sadmind is installed and started at system boot time on most

default and fully patched installations of Solaris. While many other

vendors rely on SUNRPC related routines from Sun, this design issue is

confined to Sun's sadmind authentication implementation in Solaris. 

The most inherent threat is if this exploit becomes packaged into a

cross-platform worm were it to become publicly available. 



IV. DETECTION



An exploit has been obtained and demonstrated in real-world conditions

on systems running Solaris or Trusted Solaris operating systems running

sadmind. Default installations of SunOS 5.3 thru 5.9 (Solaris 2.x, 7,

8, 9) on both the SPARC and _x86 platforms are susceptible. In

addition, versions 7 and 8 of Trusted Solaris on both the SPARC and

_x86 platforms are susceptible to exploitation. Exploitation occurs

through an initial request through UDP or TCP port 111 (sunrpc). 



V. WORKAROUNDS



For Solaris hosts that do not require the Solstice AdminSuite related

services, disable the sadmind service by commenting out the appropriate

line in /etc/inetd.conf.  Make sure to restart inetd after changing

this file (e.g. pkill -HUP inetd).



For networks, ensure proper ingress filters are in place on the

Internet router and firewall, especially on TCP and UDP port 111. 



For Solaris hosts that require the Solstice AdminSuite to be running,

the authentication security settings of sadmind should be increased to

STRONG (AUTH_DES) ? this is not the default setting. This setting also

requires the creation of NIS or NIS+ DES keys to have been created for

each Solaris user and each host.



In order to upgrade the authentication setting, the sadmind line in

/etc/inetd.conf should be changed to look like the following: 



100232/10 tli rpc/udp wait root /usr/sbin/sadmind sadmind -S 2 



Sun also recommends using the Solaris Security Toolkit (JASS) to harden

a Solaris system, http://wwws.sun.com/software/security/jass/ .



VI. VENDOR RESPONSE



Sun does not plan on releasing a patch for this issue.  Because a

working exploit now exists for this issue, Sun Microsystems Inc. is

issuing Alert 56740 to ensure administrators have proactively applied

the proper workarounds in the event this exploit or one like it becomes

publicly available. Sun's alert is available at

http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F56740 .



VII. CVE INFORMATION



The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project

has assigned CAN-2003-0722 to this issue.



VIII. DISCLOSURE TIMELINE



26 AUG 2003      Exploit acquired by iDEFENSE

26 AUG 2003      Sun notified (security-alert@xxxxxxx)

27 AUG 2003      Followup status request via phone

27 AUG 2003      Response from Derrick Scholl, Sun Security

Coordination Team

02 SEP 2003      iDEFENSE clients notified

16 SEP 2003      Coordinated Public Disclosure



IX. CREDIT



Mark Zielinski (markzielinski@xxxxxxxxxxxxxx) is credited with this

discovery.





Get paid for security research

http://www.idefense.com/contributor.html



Subscribe to iDEFENSE Advisories:

send email to listserv@xxxxxxxxxxxx, subject line: "subscribe"





About iDEFENSE:



iDEFENSE is a global security intelligence company that proactively

monitors sources throughout the world - from technical

vulnerabilities and hacker profiling to the global spread of viruses

and other malicious code. Our security intelligence services provide

decision-makers, frontline security professionals and network

administrators with timely access to actionable intelligence

and decision support on cyber-related threats. For more information,

visit http://www.idefense.com .





-----BEGIN PGP SIGNATURE-----

Version: PGP 8.0.2



iQA/AwUBP2cHuvrkky7kqW5PEQIywQCdE+ebPkgFjt9zL/uFig1zIWLM+JUAoLps

RC5Mn1cqMq4xqdONWy1EnbP0

=083t

-----END PGP SIGNATURE-----