J-Security Center

Title: Platform LSF SetUID Executables Vulnerability

Severity: HIGH

Description:

LSF(Load Sharing Facility) is a series of tools for scheduling, monitoring and analyzing the workload of a network. It supports a number of Unix platforms and can also be used to manage workstations running the Microsoft Windows NT/2000 platforms.

EAuth (External Authentication) is the standard authentication scheme for LSF, enabling remote users to execute commands. Users may opt to run another authentication scheme at their discretion, however it has been reported that this will introduce a security vulnerability to hosts running LSF.

One alternative authentication scheme is Privileged Ports Authentication (setuid), which causes all LSF executables to be installed setuid root. However, using this authentication scheme is not advised because a number of exploitable buffer overflows exist in the LSF executables.

Buffer overflows can be manipulated to allow arbitrary execution of attacker-supplied code, via the overwriting of stack variables such as the return address.

Most of these executables are exploitable locally, though a possibility exists that an attacker may contrive a way to exploit some of these issues remotely.

Affected Products:

  • Platform LSF 4.0.0
  • Platform LSF 4.2.0

References:

Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.