Linux Oracle 8.1.5.x版本的安装跟随符号链接并创建全局可读许可的orainstRoot.sh文件。本地用户利用此漏洞提升特权。
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org. A suitable work around may be to create the orainstall directory prior to running the install scripts. This can be done as follows: mkdir /tmp/orainstall chmod 700 /tmp/orainstall chown oracle:dba /tmp/orainstall
Oracle8i Standard Edition 8.1.5 for Linux Installer Vulnerability (EDBID:19794)
A vulnerability exists in the installation program for Oracle 8.1.5i. The Oracle installation scripts will create a directory named /tmp/orainstall, owned by oracle:dba, mode 711. Inside of this directory it will create a shell script named orainstRoot.sh, mode 777. The installation script will then stop and ask the person installing to run this script. The installation program at no point attempts to determine if the directory or script already exist. This makes it possible to create a symbolic link from the orainstRoot.sh file to elsewhere on the file system. This could be used to create a .rhosts file, for instance, and gain access to the root account. In addition, since the orainstRoot.sh file is mode 777, it is possible for any user on the machine to edit this script to execute arbitrary commands when run by root. Again, this can result in the compromise of the root account.
It is not readily apparent what versions of Oracle this does and does not affect. It has been confirmed on Oracle 8.1.5i, on the Linux/Intel platform.
ln -sf /.rhosts /tmp/orainstall/orainstRoot.sh