PT-2014-05: Privilege Gaining in Nixu Namesurfer
Vulnerable software
Nixu Namesurfer
Version: 7.2.2 and earlier
Link:
http://www.nixusoftware.com/our_products_ipam.html
Severity level
Severity level: High
Impact: Privilege Gaining, Arbitrary Code Execution
Access Vector: Remote
CVSS v2:
Base Score: 9.0
Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVE: not assigned
Software description
Nixu Namesurfer implements a unified system for manageming DNS servers via web interface.
Vulnerability description
The specialists of the Positive Research center have detected a Privilege Gaining vulnerability in Nixu Namesurfer.
An attacker could assign the $PATH variable with the path to his/her malicious file. An application with the suid bit will execute it. Thus the attacker will receive the highest privilege in the system.
How to fix
Update your sofware up to the latest version
Advisory status
16.01.2014 - Vendor gets vulnerability details
14.03.2014 - Vendor releases fixed version and details
27.03.2014 - Public disclosure
Credits
The vulnerability was detected by Alexey Osipov, Alexander Tlyapov, and Valentin Shilnenkov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2014-05
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/