[UNIX] IBM Lotus Domino 7 tunekrnl Multiple Vulnerabilities
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 12 Nov 2006 19:17:25 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
IBM Lotus Domino 7 tunekrnl Multiple Vulnerabilities
IBM Lotus Domino is "a software suite designed to facilitate collaboration
between co-workers". Local exploitation of multiple buffer overflow
vulnerabilities in IBM's Lotus Domino could allow an attacker to elevate
privileges to root.
* IBM Lotus Domino version 188.8.131.52 (Linux)
The 'tunekrnl' binary is used to set Linux/proc sysctl settings, allowing
Domino to increase the resource limits of the running kernel. It is
shipped with the owner set to root and the set-user-id bit on. Since the
length of input is improperly validated when copying to fixed-size
buffers, buffer overflow can occur.
Exploitation could allow local attackers to elevate their privileges to
that of the 'root' account. On most modern systems, this means that
attackers would gain complete control over the target system.
To prevent exploitation, rename or delete the /etc/SuSE-release or
/etc/redhat-release file. The 'tunekrnl' binary's vulnerable code is not
executed if this file does not exist. Also, removing the set-user-id bit
from the 'tunekrnl' binary prevents privilege escalation. However, this
may require running the utility as root manually to increase system
resource limits as needed.
IBM Lotus has addressed this problem within Domino versions 6.5.5 FP2 and
7.0.2. More information is available in IBM Technote #1249173 at
08/15/2006 - Initial vendor notification
08/15/2006 - Initial vendor response
11/08/2006 - Coordinated public disclosure
The information has been provided by
<mailto:idlabs-advisories@xxxxxxxxxxxx> iDefense Labs Security Advisories.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Marshal MailMarshal ARJ Extraction Directory Traversal
- Next by Date: [NT] IBM WebSphere Application Server Cross Site Scripting
- Previous by thread: [NT] Marshal MailMarshal ARJ Extraction Directory Traversal
- Next by thread: [NT] IBM WebSphere Application Server Cross Site Scripting