CVE-2000-0515
CVSS10.0
发布时间 :2000-06-07 00:00:00
修订时间 :2008-09-10 15:04:51
NMCOE    

[原文]The snmpd.conf configuration file for the SNMP daemon (snmpd) in HP-UX 11.0 is world writable, which allows local users to modify SNMP configuration or gain privileges.


[CNNVD]HP SNMPD文件许可漏洞(CNNVD-200006-032)

        HP-UX 11.0版本中SNMP守护程序(snmpd)的snmpd.conf配置文件存在漏洞。本地用户利用此漏洞可以修改SNMP文件或提升特权。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:hp:hp-ux:11.00HP-UX 11.00
cpe:/o:hp:hp-ux:10.20HP HP-UX 10.20

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0515
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0515
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200006-032
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/4643.php
(VENDOR_ADVISORY)  XF  hpux-snmp-daemon
http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006090640.XAA00779@hpchs.cup.hp.com
(UNKNOWN)  BUGTRAQ  20000608 Re: HP-UX SNMP daemon vulnerability
http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006070511.OAA05492@dogfoot.hackerslab.org
(UNKNOWN)  BUGTRAQ  20000607 [ Hackerslab bug_paper ] HP-UX SNMP daemon vulnerability
http://www.securityfocus.com/bid/1327
(UNKNOWN)  BID  1327

- 漏洞信息

HP SNMPD文件许可漏洞
危急 访问验证错误
2000-06-07 00:00:00 2005-05-02 00:00:00
本地  
        HP-UX 11.0版本中SNMP守护程序(snmpd)的snmpd.conf配置文件存在漏洞。本地用户利用此漏洞可以修改SNMP文件或提升特权。

- 公告与补丁

        There does not appear to be a fix available for the /tmp/snmpd.log problem. A patch is available for the configuration file permission issue.
        HP HP-UX 11.0
        

  •         HP PHSS_21046
            

  •         

- 漏洞信息 (20002)

HP-UX 10.20/11.0 SNMPD File Permission Vulnerabilities (EDBID:20002)
hp-ux local
2000-06-07 Verified
0 loveyou
N/A [点击下载]
source: http://www.securityfocus.com/bid/1327/info

A vulnerability exists in the snmpd included with HPUX 11, from Hewlett Packard. The configuration file for the snmpd is world writable. This could allow any user on the system to view and/or alter the settings of the snmp daemon. This in turn could be used to alter the configuration of the system, including, but not limited to, routing, addressing, arp caches, the status of connections, and so on. It is also possible this could be used to elevate access levels.

Another vulnerability exists which allows users to redirect the logging location of snmpd to an alternate location, using symbolic links. This file is in a mode 777 directory, so any user can remove a file that already exists. Used in conjunction with the ability to alter configuration, this may also help leverage root access. This file is created at boot time, and while /tmp is cleared of its contents, there may be a potential window where a user can create a symbolic link prior to its creation, and directly use this to elevate privileges. 

edit /etc/SnmpAgent.d/snmpd.conf. It is world writable. 		

- 漏洞信息

1390
HP-UX snmpd.conf SNMPD File Permission Weakness Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity Workaround, Patch / RCS
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2000-06-07 Unknow
Unknow Unknow

- 解决方案

HP has released a patch to address this vulnerability. Additionally, it is possible to temporarily work around the flaw by implementing the following workaround: restore the appropriate permssions on the vulnerable SNMP files. To change the permissions, execute the following commands: chmod 600 /etc/SnmpAgent.d chmod 600 /var/adm/snmpd.log

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站