module

Quest Privilege Manager pmmasterd Buffer Overflow

Disclosed
2017-04-09
Created
2018-05-30

Description

This modules exploits a buffer overflow in the Quest Privilege Manager,
a software used to integrate Active Directory with Linux and Unix
systems. The vulnerability exists in the pmmasterd daemon, and can only
triggered when the host has been configured as a policy server (
Privilege Manager for Unix or Quest Sudo Plugin). A buffer overflow
condition exists when handling requests of type ACT_ALERT_EVENT, where
the size of a memcpy can be controlled by the attacker. This module
only works against version vulnerable, but not supported by this module (a stack cookie bypass is
required). NOTE: To use this module it is required to be able to bind a
privileged port ( from unprivileged ports, which in most situations means that root
privileges are required.

Author

m0t

Platform

Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/misc/quest_pmmasterd_bof
msf exploit(quest_pmmasterd_bof) > show targets
...targets...
msf exploit(quest_pmmasterd_bof) > set TARGET < target-id >
msf exploit(quest_pmmasterd_bof) > show options
...show and set options...
msf exploit(quest_pmmasterd_bof) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.