Greetings, OVERVIEW A vulnerability in IBM's Network Station Manager will allow any local user to gain root privileges. BACKGROUND Though I only tested NetStation on UnixWare 7.1, I would imagine that this vulnerability is present on most NetStation implementations. This daemon is installed/running as root by default. DETAILS >From the help html: The IBM Network Station Manager is a browser-based tool for centrally administering IBM Network Stations and their users. Using the IBM Network Station Manager, the administrator can set IBM Network Station settings on a server wide basis or an individual user or workstation basis. Settings are specifications defining hardware (keyboards, mouse speeds and so on) and software as it applies to your session. More or less, it's an http gui for managing your desktop configuration. A vulnerability exists in the way NetStation creates temporary files. Instead of using the secure-ish mktemp, NetStation merely appends the current time in seconds to a known file name. Normally, tmp races aren't a big deal for http daemons since they run as nobody or similar, but NetStation must run as root to be able to open/modify files as a specific user. Thus, we can brute force a symlink from xnec.nsu.