/*
source: https://www.securityfocus.com/bid/452/info
There is an unchecked sprintf() call in the versions of /usr/openwin/bin/kcms_configure shipped with solaris 2.5, 2.5.1 and 2.6. Unfortunately, kcms_configure is installed setuid root, making it possible for an attacker to overflow the buffer and have arbitrary code executed with superuser privileges. The consequence of this vulnerability being exploited is a local root compromise.
UNYUN@ShadowPenguinSecurity·$B$G$9·(B
·$B<+8J%l%9$G$9!#·(B
> ·$B$J$*!"·(BSolaris7 Sparc Edition·$B$K$bF1MM$NLdBj$,$"$j$^$9$,!"·(B
> Solaris2.6(Sparc)·$B$G$O:F8=$7$^$;$s$G$7$?!#·(B
Solaris 2.6 (Sparc)·$B$G$b:F8=$9$k$h$&$G$9!#·(B
Solaris 2.6 (Sparc)·$B$O%3%s%=!<%k%m%0%$%s$7$?>uBV$G%A%'%C%/$7$?$N$G$9$,!"%3·(B
·$B%s%=!<%k%m%0%$%s$@$H$3$NLdBj$O·(BSolaris7·$B$G$b:F8=$7$J$$$h$&$G$9!#%M%C%H%o!<·(B
·$B%/7PM3$G$N$_:F8=$9$k$h$&$G!"B>$N%^%7%s$+$i$N·(Btelnet·$B$K$F·(BSolaris2.6 (Sparc)
·$B$G$b:F8=$9$k$3$H$,3NG'$5$l$^$7$?!#$*$=$i$/!"·(Bintel·$BHG·(BSolaris2.6·$B$bF1MM$@$H;W·(B
·$B$o$l$^$9!#·(B
case 1: exploit·$B2DG=·(B
hoge : ·$B%3%s%=!<%k%m%0%$%s·(B