The nslookup command fails to drop privileges, allowing local attackers to gain root privileges.
The nslookup program fails to drop the privileges it gains from being setuid. This access appears to be needed to read the "/etc/resolv.conf" file. This problem was described in IBM ERS advisory ERS-SVA-E01-1997:008.1.
Intruders with access to a local user account may be able to gain root privileges.
Apply a Patch
Disable the setuid bit on nslookup
You can prevent this vulnerability from being exploited by removing the setuid bit from the nslookup program. You can do this by executing the following command as root:
This document was written by Cory F. Cohen.
|Date First Published:||2001-09-26|
|Date Last Updated:||2001-09-27 19:00 UTC|