Overview
The nslookup command fails to drop privileges, allowing local attackers to gain root privileges.
Description
The nslookup program fails to drop the privileges it gains from being setuid. This access appears to be needed to read the "/etc/resolv.conf" file. This problem was described in IBM ERS advisory ERS-SVA-E01-1997:008.1. |
Impact
Intruders with access to a local user account may be able to gain root privileges. |
Solution
Apply a Patch |
Disable the setuid bit on nslookup You can prevent this vulnerability from being exploited by removing the setuid bit from the nslookup program. You can do this by executing the following command as root: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A |
References
Acknowledgements
This document was written by Cory F. Cohen.
Other Information
CVE IDs: | CVE-1999-0093 |
Severity Metric: | 2.76 |
Date Public: | 1997-10-29 |
Date First Published: | 2001-09-26 |
Date Last Updated: | 2001-09-27 19:00 UTC |
Document Revision: | 10 |