CVE-2001-0061
CVSS7.2
发布时间 :2001-02-12 00:00:00
修订时间 :2008-09-05 16:23:10
NMCO    

[原文]procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.


[CNNVD]FreeBSD procfs权限许可和访问控制漏洞(CNNVD-200102-051)

        FreeBSD和可能其他操作系统的procfs不能正确限制对每个进程mem和ctl文件的访问。本地用户可以通过分叉子程序并执行子程序的特权进程提升根目录特权,但父进程保留对子进程地址空间的访问权限。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:freebsd:freebsd:4.2FreeBSD 4.2
cpe:/o:freebsd:freebsd:4.1.1FreeBSD 4.1.1
cpe:/o:freebsd:freebsd:3.5.1FreeBSD 3.5.1
cpe:/o:freebsd:freebsd:4.1FreeBSD 4.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0061
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0061
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200102-051
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2130
(VENDOR_ADVISORY)  BID  2130
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc
(VENDOR_ADVISORY)  FREEBSD  FreeBSD-SA-00:77
http://xforce.iss.net/xforce/xfdb/6106
(UNKNOWN)  XF  procfs-elevate-privileges(6106)
http://www.osvdb.org/1697
(UNKNOWN)  OSVDB  1697

- 漏洞信息

FreeBSD procfs权限许可和访问控制漏洞
高危 未知
2001-02-12 00:00:00 2005-05-02 00:00:00
本地  
        FreeBSD和可能其他操作系统的procfs不能正确限制对每个进程mem和ctl文件的访问。本地用户可以通过分叉子程序并执行子程序的特权进程提升根目录特权,但父进程保留对子进程地址空间的访问权限。

- 公告与补丁

        

- 漏洞信息

1697
FreeBSD procfs Per-process mem / ctl File Child Process Handling Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

FreeBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when procfs fails to properly restrict access to per-process mem and ctl files, which allows a malicious user to gain root privileges by forking a child process and executing privileged processes from the child. This flaw may lead to a loss of integrity.

- 时间线

2000-12-18 Unknow
2000-12-18 Unknow

- 解决方案

Upgrade to version FreeBSD system to 3.5.1-STABLE or 4.2-STABLE dated after the correction date, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): (1) unmount all procfs filesystems which are visible from within jail environments and (2) Remove the "options PROCFS" line from your kernel configuration file, if present, and compile a new kernel. Also, FreeBSD has released a patch.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站