CVE-2003-1073

LOW1.2/ 10.0
Share:
Published: December 31, 2003 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

A race condition in the at command for Solaris 2.6 through 9 allows local users to delete arbitrary files via the -r argument with .. (dot dot) sequences in the job name, then modifying the directory structure after at checks permissions to delete the file and before the deletion actually takes place.

CVSS Metrics

Base Score
1.2
Severity
LOW
Vector String
AV:L/AC:H/Au:N/C:N/I:P/A:N

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Solaris systems are vulnerable to a local privilege escalation attack via a race condition in the at command. Attackers can leverage this flaw to delete arbitrary files, potentially leading to system instability or denial of service by manipulating the file system during the job scheduling process.

02 // Vulnerability Mechanism

Step 1: Job Submission: The attacker submits an at job using the -r argument and a crafted job name containing .. sequences to target a sensitive file outside the expected job directory.

Step 2: Permission Check: The at command checks if the user has permission to delete the file specified by the crafted job name.

Step 3: File System Manipulation: After the permission check, but before the file deletion, the attacker manipulates the file system. This could involve moving the targeted file or creating a symbolic link to the target file.

Step 4: File Deletion: The at command attempts to delete the file based on the job name. Due to the file system manipulation, the deletion now targets a file the attacker should not have access to.

Step 5: Arbitrary File Deletion: The attacker successfully deletes the targeted file, potentially causing system instability or denial of service.

03 // Deep Technical Analysis

The vulnerability stems from a race condition within the at command's handling of job names and file deletion. The at command, when invoked with the -r option and a job name containing .. (dot-dot) sequences, allows an attacker to specify a target file outside the intended job directory. The flaw lies in the time window between the permission check and the actual file deletion. The at command first checks if the user has permission to delete the file, but before the deletion occurs, an attacker can manipulate the file system (e.g., by moving the target file) to bypass the permission check. This allows the attacker to delete files they should not have access to, leading to a potential denial of service or system compromise. The root cause is a lack of proper synchronization and atomic operations during the file deletion process, making it susceptible to timing-based attacks.

References & Intelligence

http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0044.html
Source: cve@mitre.org
http://isec.pl/vulnerabilities/isec-0008-sun-at.txt
Source: cve@mitre.org
http://secunia.com/advisories/7960/
Source: cve@mitre.org
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-50161-1
Source: cve@mitre.org
Vendor Advisory
http://www.ciac.org/ciac/bulletins/n-070.shtml
Source: cve@mitre.org
http://www.securityfocus.com/archive/1/308577
Source: cve@mitre.org
http://www.securityfocus.com/bid/6692
Source: cve@mitre.org
http://www.securityfocus.com/bid/6693
Source: cve@mitre.org
http://www.securitytracker.com/id?1005994
Source: cve@mitre.org
https://exchange.xforce.ibmcloud.com/vulnerabilities/11179
Source: cve@mitre.org
https://exchange.xforce.ibmcloud.com/vulnerabilities/11180
Source: cve@mitre.org
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0044.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://isec.pl/vulnerabilities/isec-0008-sun-at.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/7960/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-50161-1
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.ciac.org/ciac/bulletins/n-070.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/308577
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/6692
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/6693
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1005994
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/11179
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/11180
Source: af854a3a-2127-422b-91ae-364da2661108
CVE-2003-1073 - LOW Severity (1.2) | Free CVE Database | 4nuxd