CERT Warns of Solaris Exploit
Download the authoritative guide: Data Center Guide: Optimizing Your Data Center Strategy
Download the authoritative guide: Cloud Computing: Using the Cloud for Competitive Advantage
By Thor Olavsrud A vulnerability in a graphical user interface for UNIX and Linux systems is being actively exploited against Solaris systems.
A vulnerability in the Common Desktop Environment (CDE) graphical user interface for the UNIX and Linux operating systems is being actively exploited in attacks against Solaris systems, the Computer Emergency Response Team Coordination Center (CERT/CC) warned Monday.
The vulnerability, discovered in November, consists of a remotely exploitable buffer overflow in a library function used by the CDE Subprocess Control Service (dtspcd), a network daemon that accepts requests from clients to execute commands and launch applications remotely. CERT said that on systems running CDE dtspcd is spawned by the Internet services daemon (typically inetd or xinetd) in response to a CDE client request. dtspcd is typically configured to run on port 6112/tcp with root privileges.
During client negotiation, dtspcd accepts a length value and subsequent data from the client with performing adequate input validation, CERT said. Using this flaw, an attacker can manipulate data sent to dtspcd, causing a buffer overflow and potentially gaining the ability to execute code with root privileges.
Many UNIX systems ship with CDE installed and enabled by default.
CERT said it has received reports of scanning for dtspcd (6112/tcp) since the advisory on the vulnerability was released in November, and now, using network traces provided by The Honeynet Project, CERT said it has confirmed that the vulnerability is being actively exploited.
As a stopgap until patches are available, CERT suggested limiting or blocking access to the Subprocess Control Service from untrusted networks by using a firewall or other packet-filtering technology. Additionally, CERT said it may be possible to use a TCP wrapper to provide improved access control and logging functionality for dtspcd connections. CERT also suggested disabling dtspcd by commenting out the appropriate entry in /etc/inetd.conf.
CERT also noted that several Internet-enabled games may use 6112/tcp as part of a legitimate function.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...