110265 2003-08-20 20:52 /4 rader/ KF <dotslash@snosoft.com> Importerad: 2003-08-20 20:52 av Brevbäraren Extern mottagare: bugtraq <bugtraq@securityfocus.com> Mottagare: Bugtraq (import) <6158> Ärende: SRT2003-08-11-0729 - Linux based antivirus software contains several local overflows ------------------------------------------------------------ http://www.secnetops.biz/research (110265) /KF <dotslash@snosoft.com>/---------------- Bilaga (text/plain) i text 110266 110266 2003-08-20 20:52 /142 rader/ KF <dotslash@snosoft.com> Bilagans filnamn: "SRT2003-08-11-0729.txt" Importerad: 2003-08-20 20:52 av Brevbäraren Extern mottagare: bugtraq <bugtraq@securityfocus.com> Mottagare: Bugtraq (import) <6159> Bilaga (text/plain) till text 110265 Ärende: Bilaga (SRT2003-08-11-0729.txt) till: SRT2003-08-11-0729 - Linux based antivirus software contains several local overflows ------------------------------------------------------------ Secure Network Operations, Inc. http://www.secnetops.com Strategic Reconnaissance Team research@secnetops.com Team Lead Contact kf@secnetops.com Our Mission: ************************************************************************ Secure Network Operations offers expertise in Networking, Intrusion Detection Systems (IDS), Software Security Validation, and Corporate/Private Network Security. Our mission is to facilitate a secure and reliable Internet and inter-enterprise communications infrastructure through the products and services we offer. Quick Summary: ************************************************************************ Advisory Number : SRT2003-08-11-0729 Product : ViRobot Linux Server Version : Ver 2.0 Vendor : http://www.hauri.net Class : local (remote?) Criticality : High Operating System(s) : *nix High Level Explanation ************************************************************************ High Level Description : Antivirus software has local security issues What to do : chmod -s all suids in /usr/local/ViRobot/ Technical Details ************************************************************************ Proof Of Concept Status : SNO has PoC code for this issue Low Level Description : Alex Hernandez "Security Specialist" from Spain pointed out to us that a new unix based antivirus solution contained a large number of suids. Based on this information we both began beating on the suids in efforts to expose security issues. ViRobot Linux Server protects your file server from viruses. It can have up-to-date definition files through scheduled update and it scans most compressed file formats. ViRobot Linux Server is very convenient with remote-control function via web access. A user who has the ID and password for the server, can access ViRobot on the server from any computer via web browser. Please have a safe server with ViRobot Linux Server... but be sure to chmod -s everything in sight. There are several potential suids to abuse... some have local overflows that may or may not be exploitable I honestly only checked a few since most are run as cgi scripts (more fun later?). ./vrupdate ./cgi-bin/addexceptdir ./cgi-bin/addschscan ./cgi-bin/addschup ./cgi-bin/addtargetdir ./cgi-bin/applyadmin ./cgi-bin/applybackuplog ./cgi-bin/applyfilescan ./cgi-bin/bottom ./cgi-bin/deletelog ./cgi-bin/delschscan ./cgi-bin/delschup ./cgi-bin/filescan ./cgi-bin/frame ./cgi-bin/help ./cgi-bin/help1 ./cgi-bin/help2 ./cgi-bin/login ./cgi-bin/main ./cgi-bin/menu ./cgi-bin/menu2 ./cgi-bin/menu3 ./cgi-bin/menu4 ./cgi-bin/menu5 ./cgi-bin/menu6 ./cgi-bin/rmdir ./cgi-bin/schscan ./cgi-bin/schupdate ./cgi-bin/setadmin ./cgi-bin/setbackuplog ./cgi-bin/setfilescan ./cgi-bin/setupdate ./cgi-bin/top ./cgi-bin/update ./cgi-bin/ver_info ./cgi-bin/viewfilelog ./cgi-bin/viewupdatelog ./cgi-bin/virobot ./cgi-bin/vrupdate ./cgi-bin/warningmessage ./cgi-bin/webvrscan [kf@vegeta kf]$ ln -s /usr/local/ViRobot/cgi-bin/virobot virobot [kf@vegeta kf]$ ./ex_virobot ViRobot Linux Server Local root exploit BY: Dvdman@l33tsecurity.com BUG FOUND BY: KF@SNOSOFT.COM TERM environment variable not set. ------------------------------------------------------------------------------- ViRobot Linux Server ( Heuristic & Feature detection ) 10 May 2002 Korea Copyright (c) 1998-2003 HAURI Inc. All rights reserved E-mail : support@hauri.net Version 2.0 ------------------------------------------------------------------------------- Usage : virobot [<option list>] -d [directory] <option list> : --recursive : Subdirectory Scanning --archive : Archive File Scanning --recovery : Repair Infected File --delete : Delete Infected File --backup : Backup Infected File --version : Display ViRobot Engine Version --help : DisPlay The Command Line Options sh-2.05b# id uid=0(root) gid=500(kf) groups=500(kf) Thanks to alex_hernandez [at] ureach.com for passing the information on to our staff. Patch or Workaround : chmod -s all suids in /usr/local/ViRobot/ Vendor Status : vendor communication was minimal Bugtraq URL : to be assigned ------------------------------------------------------------------------ This advisory was released by Secure Network Operations,Inc. as a matter of notification to help administrators protect their networks against the described vulnerability. Exploit source code is no longer released in our advisories. Contact research@secnetops.com for information on how to obtain exploit information. (110266) /KF <dotslash@snosoft.com>/------(Ombruten)