发布时间 :2000-06-07 00:00:00
修订时间 :2017-10-09 21:29:10

[原文]The snmpd.conf configuration file for the SNMP daemon (snmpd) in HP-UX 11.0 is world writable, which allows local users to modify SNMP configuration or gain privileges.

[CNNVD]HP SNMPD文件许可漏洞(CNNVD-200006-032)

        HP-UX 11.0版本中SNMP守护程序(snmpd)的snmpd.conf配置文件存在漏洞。本地用户利用此漏洞可以修改SNMP文件或提升特权。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:hp:hp-ux:10.20HP HP-UX 10.20
cpe:/o:hp:hp-ux:11.00HP-UX 11.00

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  1327
(UNKNOWN)  BUGTRAQ  20000607 [ Hackerslab bug_paper ] HP-UX SNMP daemon vulnerability
(UNKNOWN)  BUGTRAQ  20000608 Re: HP-UX SNMP daemon vulnerability
(UNKNOWN)  XF  hpux-snmp-daemon

- 漏洞信息

HP SNMPD文件许可漏洞
危急 访问验证错误
2000-06-07 00:00:00 2005-05-02 00:00:00
        HP-UX 11.0版本中SNMP守护程序(snmpd)的snmpd.conf配置文件存在漏洞。本地用户利用此漏洞可以修改SNMP文件或提升特权。

- 公告与补丁

        There does not appear to be a fix available for the /tmp/snmpd.log problem. A patch is available for the configuration file permission issue.
        HP HP-UX 11.0

  •         HP PHSS_21046


- 漏洞信息 (20002)

HP-UX 10.20/11.0 SNMPD File Permission Vulnerabilities (EDBID:20002)
hp-ux local
2000-06-07 Verified
0 loveyou
N/A [点击下载]

A vulnerability exists in the snmpd included with HPUX 11, from Hewlett Packard. The configuration file for the snmpd is world writable. This could allow any user on the system to view and/or alter the settings of the snmp daemon. This in turn could be used to alter the configuration of the system, including, but not limited to, routing, addressing, arp caches, the status of connections, and so on. It is also possible this could be used to elevate access levels.

Another vulnerability exists which allows users to redirect the logging location of snmpd to an alternate location, using symbolic links. This file is in a mode 777 directory, so any user can remove a file that already exists. Used in conjunction with the ability to alter configuration, this may also help leverage root access. This file is created at boot time, and while /tmp is cleared of its contents, there may be a potential window where a user can create a symbolic link prior to its creation, and directly use this to elevate privileges. 

edit /etc/SnmpAgent.d/snmpd.conf. It is world writable. 		

- 漏洞信息

HP-UX snmpd.conf SNMPD File Permission Weakness Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity Workaround, Patch / RCS
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2000-06-07 Unknow
Unknow Unknow

- 解决方案

HP has released a patch to address this vulnerability. Additionally, it is possible to temporarily work around the flaw by implementing the following workaround: restore the appropriate permssions on the vulnerable SNMP files. To change the permissions, execute the following commands: chmod 600 /etc/SnmpAgent.d chmod 600 /var/adm/snmpd.log

- 相关参考

- 漏洞作者

Unknown or Incomplete