发布时间 :2001-05-03 00:00:00
修订时间 :2017-10-09 21:29:38

[原文]inetd ident server in FreeBSD 4.x and earlier does not properly set group permissions, which allows remote attackers to read the first 16 bytes of files that are accessible by the wheel group.


        FreeBSD 4.x及其早期版本中的inetd ident服务器不能正确设置组权限,远程攻击者可以借助车轮组件读取能访问的第一个16字节的文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:freebsd:freebsd:3.5FreeBSD 3.5
cpe:/o:freebsd:freebsd:3.5.1FreeBSD 3.5.1
cpe:/o:freebsd:freebsd:4.1.1FreeBSD 4.1.1
cpe:/o:freebsd:freebsd:4.2FreeBSD 4.2

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  inetd-ident-read-files(6052)

- 漏洞信息

中危 未知
2001-05-03 00:00:00 2005-05-02 00:00:00
        FreeBSD 4.x及其早期版本中的inetd ident服务器不能正确设置组权限,远程攻击者可以借助车轮组件读取能访问的第一个16字节的文件。

- 公告与补丁


- 漏洞信息

FreeBSD inetd ident wheel Group Arbitrary Local File Access
Local Access Required Information Disclosure
Loss of Confidentiality Patch / RCS
Exploit Public

- 漏洞描述

FreeBSD contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when inetd incorrectly sets group privileges on child processes, and when an ident request is received, the process is assigned privileges of the wheel (root group), which will disclose the first 16 bytes of any wheel-accessible file resulting in a loss of confidentiality.

- 时间线

2001-01-29 Unknow
2001-01-29 2001-01-29

- 解决方案

Upgrade to version FreeBSD system to 3.5-STABLE or 4.2-STABLE after the correction date, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): disable the internal ident server, if enabled: comment out all lines beginning with "auth" in /etc/inetd.conf, then restart inetd by sending it a SIGHUP: #killall -HUP inetd

- 相关参考

- 漏洞作者