COMMAND
libi18n
SYSTEMS AFFECTED
IBM AIX 4.3.x and 5.1
PROBLEM
Following is based on a MSS-OAR-E01-2001:271.1 IBM Advisory. AIX
ships with the library "libi18n" located in the "/usr/ccs/lib"
directory. This library contains a function that is vulnerable
to a buffer overflow through the LANG environment variable.
An ordinary user has the ability to set the "LANG" environment
variable to any value they choose. When this variable is set to a
suitably formatted string and a program is run which uses the
vulnerable library, the program will terminate abnormally. If
this program is also setuid root, aixterm for example, a
malicious user has an opportunity to spawn a root shell and gain
control of the machine.
A malicious local user can use a well-crafted exploit code to gain
root privileges on the attacked system, compromising the integrity
of the system and its attached local network.
CRedit goes to Troy Bollinger of IBM MSSD for discovering this
vulnerability and for demonstrating its exploitation.
SOLUTION
If you do not wish to install the efix for this vulnerability but
instead wait for the APAR that fixes it to be made available, you
can also negate this vulnerability by making the "aixterm"
program to be non-SUID. You must be "root" to do this. Ordinary
users will still be able to use the program, although there may
be unexpected side effects.
IBM is working on the following fixes which will be available
soon:
AIX 4.3.x - IY20867
AIX 5.1.0 - IY21309
Fix will not be provided for versions prior to 4.3 as these are
no longer supported by IBM. Affected customers are urged to
upgrade to 4.3.3 at the latest maintenance level, or to 5.1.
The temporary fixes can be downloaded via ftp from:
ftp://aix.software.ibm.com/aix/efixes/security/libi18n_efix.tar.Z
The efix tarball consists of a patched libi18n tarred binary which
is compatible with both 4.3.x and 5.1.0 releases. These temporary
fixes have not been fully regression tested; thus, IBM does not
warrant the fully correct functioning of the efix. Customers
install the efix and operate the modified version of AIX at their
own risk.