{"vuid":"VU#569272","idnumber":"569272","name":"System V derived login contains a remotely exploitable buffer overflow","keywords":["Sun","Solaris","System V","login","buffer overflow","remote","root","classic"],"overview":"A remotely exploitable buffer overflow exists in implementations of login, derived from System V. An attacker can use this vulnerability to gain the privileges of the process that invoked login, user root in the cases of  in.telnetd, or in.rlogind. We have been able to determine that several vendors are affected.","clean_desc":"Implementations of login, derived from System V, use a fixed-size buffer to store environment and argument variables that are received from other programs. This buffer can be overflowed by inputing numerous variables. An attacker can use this vulnerability to gain the privileges of the process that invoked login. If an attacker with a local shell invokes login directly, they can only gain the privileges of the shell they already have. However, if the attacker can invoke login via a suid root program, such as the in.telnetd or in.rlogind daemons, they can gain the privileges of the invoking suid program, typically root. And of course, because in.telnetd and in.rlogind are available over the network, an attacker without any previous access to the system could use this vulnerability to gain root access directly. An exploit exists and may be circulating.","impact":"A remote intruder can gain a root shell.","resolution":"Apply a patch when one becomes available. If patches are not available for your version, upgrade to a supported version and apply all patches.","workarounds":"Disable telnet, rlogin, and other programs that use login for authentication. Use programs that use SSH instead and do not use login by default.","sysaffected":"","thanks":"Our thanks to Mark Dowd and ISS for the report and information contained in their advisory and to Sun Microsystems for their help in identifing the location of the vulnerability.","author":"This document was written by Jason Rafail.","public":["http://xforce.iss.net/alerts/advise105.php","http://www.securityfocus.com/bid/3681"],"cveids":["CVE-2001-0797"],"certadvisory":"CA-2001-34","uscerttechnicalalert":null,"datecreated":"2001-10-19T16:22:01Z","publicdate":"2001-12-12T00:00:00Z","datefirstpublished":"2001-12-12T21:51:13Z","dateupdated":"2002-04-11T18:03:04Z","revision":38,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"18","cam_scorecurrentwidelyknown":"39.375","cam_scorecurrentwidelyknownexploited":"61.875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.0,"vulnote":null}