发布时间 :1997-05-06 00:00:00
修订时间 :2008-09-09 08:33:36

[原文]webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter.

[CNNVD]IRIX cgi-bin webdist.cgi 漏洞(CNNVD-199705-006)

        SGI IRIX上的webdist CGI 程序(webdist.cgi)存在漏洞。远程攻击者可以通过distloc参数中的shell元字符执行任意命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:sgi:irix:6.3SGI IRIX 6.3
cpe:/o:sgi:irix:6.2SGI IRIX 6.2
cpe:/o:sgi:irix:5.2SGI IRIX 5.2
cpe:/o:sgi:irix:5.3SGI IRIX 5.3
cpe:/o:sgi:irix:5.1SGI IRIX 5.1
cpe:/o:sgi:irix:6.1SGI IRIX 6.1

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  CERT  CA-1997-12
(UNKNOWN)  XF  http-sgi-webdist(333)
(UNKNOWN)  SGI  19970501-02-PX

- 漏洞信息

IRIX cgi-bin webdist.cgi 漏洞
高危 输入验证
1997-05-06 00:00:00 2006-11-16 00:00:00
        SGI IRIX上的webdist CGI 程序(webdist.cgi)存在漏洞。远程攻击者可以通过distloc参数中的shell元字符执行任意命令。

- 公告与补丁

        Removal of the webdist.cgi program is the safest option.
        Please go to SGI support at for official patches from Silicon Graphics for this any other vulnerabilities.
        OS Version Vulnerable? Patch # Other Actions
        IRIX 3.x no
        IRIX 4.x no
        IRIX 5.0.x no
        IRIX 5.1.x no
        IRIX 5.2 no
        IRIX 5.3 yes 2315
        IRIX 6.0.x yes not avail Note
        IRIX 6.1 yes not avail Note
        IRIX 6.2 yes 2314
        IRIX 6.3 yes 2338
        IRIX 6.4 yes 2338
        Note means to upgrade operating system or see temp solutions

- 漏洞信息 (19299)

SGI IRIX <= 6.3 cgi-bin webdist.cgi Vulnerabilty (EDBID:19299)
multiple remote
1997-05-06 Verified
0 Anonymous
N/A [点击下载]

A vulnerability exists in the webdist.cgi program, as shipped by Silicon Grpahics Inc with the Irix operating system. This vulnerability will allow any remote user to execute arbitrary commands on an affected machine. Commands will be executed with the privileges of the httpd daemon.




- 漏洞信息

IRIX webdist.cgi distloc Parameter Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity Workaround, Upgrade
Exploit Public

- 漏洞描述

IRIX contains a flaw that may allow remote command execution. The issue is triggered when a malicious attacker utilizes the Webdist script (webdist.cgi) of the Out Box Environment Subsystem. The remote command execution occurs with the privileges of the httpd daemon. This flaw may lead to a loss of integrity.

- 时间线

1997-05-06 Unknow
1997-05-06 Unknow

- 解决方案

Upgrade to version 6.5 or higher, as it has been reported to fix this vulnerability. Also, Silicon Graphics, Inc. has released a patch to address this issue. It is also possible to correct the flaw by implementing the following workaround: #/bin/chmod 400 /var/www/cgi-bin/webdist.cgi #/bin/chmod 400 /var/www/cgi-bin/handler #/bin/chmod 400 /var/www/cgi-bin/wrap

- 相关参考

- 漏洞作者

Unknown or Incomplete