Overview
The sadmind service provided on many Solaris and SunOS systems ships with an insecure default configuration that allows remote users to execute arbitrary commands with superuser (root) privileges.
Description
The Sun Microsystems Solstice AdminSuite is a graphical tool that allows Solaris and SunOS hosts to be administered by a remote host. The daemon portion of the program (sadmind) is a setuid root application that listens for requests from a remote administration client. In its default configuration, sadmind accepts requests using "AUTH_SYS" authentication, which uses plaintext authentication in a format that can be easily manipulated by an attacker. Since sadmind is designed to allow the remote execution of arbitrary commands, an attacker who is able to spoof the authentication portion of a packet can execute commands with little difficulty. The daemon can be configured to operate securely by specifying a security level of 2, which causes sadmind to require "AUTH_DES" authentication. This capability has existed since at least April 1999, when the sadmind man page was updated for SunOS 5.9. The recommendation to use security level 2 was provided in Sun Security Bulletin #00191 and CERT Advisory CA-1999-16, so it is likely that many Solaris systems have been configured to disable this service. However, the insecure default configuration is still shipped with modern releases of Solaris, so system administrators are encouraged to review their configurations. |
Impact
Affected systems allow remote users to execute arbitrary commands with the privileges of the sadmind daemon, typically superuser (root). |
Solution
The CERT/CC is not aware of a permanent solution that addresses this vulnerability. |
Configure sadmind to use AUTH_DES authentication |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F56740&zone_32=category%3Asecurity
- http://docs.sun.com/db/doc/816-0211/6m6nc676b?a=view
- http://www.idefense.com/advisory/09.16.03.txt
- http://www.cert.org/advisories/CA-1999-16.html
- http://www.kb.cert.org/vuls/id/28934
- http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0977
- http://www.secunia.com/advisories/9742/
Acknowledgements
The CERT/CC thanks Sun Microsystems for acknowledging this vulnerability.
This document was written by Jeffrey P. Lanza.
Other Information
CVE IDs: | CVE-2003-0722 |
Severity Metric: | 104.74 |
Date Public: | 1999-04-03 |
Date First Published: | 2003-09-19 |
Date Last Updated: | 2003-09-19 22:01 UTC |
Document Revision: | 22 |