PT-2014-05: Privilege Gaining in Nixu Namesurfer

Vulnerable software

Nixu Namesurfer
Version: 7.2.2 and earlier

Link:
http://www.nixusoftware.com/our_products_ipam.html

Severity level

Severity level: High
Impact: Privilege Gaining, Arbitrary Code Execution
Access Vector: Remote

CVSS v2:
Base Score: 9.0
Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVE: not assigned

Software description

Nixu Namesurfer implements a unified system for manageming DNS servers via web interface.

Vulnerability description

The specialists of the Positive Research center have detected a Privilege Gaining vulnerability in Nixu Namesurfer.

An attacker could assign the $PATH variable with the path to his/her malicious file. An application with the suid bit will execute it. Thus the attacker will receive the highest privilege in the system.

How to fix

Update your sofware up to the latest version

Advisory status

16.01.2014 - Vendor gets vulnerability details
14.03.2014 - Vendor releases fixed version and details
27.03.2014 - Public disclosure

Credits

The vulnerability was detected by Alexey Osipov, Alexander Tlyapov, and Valentin Shilnenkov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2014-05

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
4G and 5G are not ready for smart cities