CVE-2001-0573
CVSS4.6
发布时间 :2001-08-02 00:00:00
修订时间 :2008-09-05 16:24:26
NMCOS    

[原文]lsfs in AIX 4.x allows a local user to gain additional privileges by creating Trojan horse programs named (1) grep or (2) lslv in a certain directory that is under the user's control, which cause lsfs to access the programs in that directory.


[CNNVD]AIX 'lsfs'本地权限提升漏洞(CNNVD-200108-003)

        
        AIX是一款由IBM公司开发和维护的商业性质UNIX操作系统。
        AIX中包含的lsfs工具在执行其他系统工具时没有正确检查执行程序的路径,本地攻击者可以利用这个漏洞以特权用户权限执行任意命令。
        lsfs工具是用来显示文件系统信息的工具,如文件系统挂接点、权限、卷大小等信息。要对此信息列表,它会执行lslv来列出逻辑卷和使用'grep'来解析输出结果。当执行'grep'和'lslv'时由于lsfs使用相对路径名,攻击者可以修改SHELL PATH环境变量来欺骗lsfs工具运行攻击者提供的二进制程序,因为lsfs是以'root'用户属性安装,因此所有命令将以root用户权限执行,导致权限提升。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0573
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0573
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-003
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/123651
(UNKNOWN)  CERT-VN  VU#123651
http://archives.neohapsis.com/archives/aix/2001-q2/0000.html
(VENDOR_ADVISORY)  AIXAPAR  IY16909
http://xforce.iss.net/static/7007.php
(UNKNOWN)  XF  aix-lsfs-path(7007)
http://www.osvdb.org/5582
(UNKNOWN)  OSVDB  5582

- 漏洞信息

AIX 'lsfs'本地权限提升漏洞
中危 设计错误
2001-08-02 00:00:00 2005-05-02 00:00:00
本地  
        
        AIX是一款由IBM公司开发和维护的商业性质UNIX操作系统。
        AIX中包含的lsfs工具在执行其他系统工具时没有正确检查执行程序的路径,本地攻击者可以利用这个漏洞以特权用户权限执行任意命令。
        lsfs工具是用来显示文件系统信息的工具,如文件系统挂接点、权限、卷大小等信息。要对此信息列表,它会执行lslv来列出逻辑卷和使用'grep'来解析输出结果。当执行'grep'和'lslv'时由于lsfs使用相对路径名,攻击者可以修改SHELL PATH环境变量来欺骗lsfs工具运行攻击者提供的二进制程序,因为lsfs是以'root'用户属性安装,因此所有命令将以root用户权限执行,导致权限提升。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 去掉lsfs的setuid位。
        厂商补丁:
        IBM
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        IBM APAR IY16909
        
        http://techsupport.services.ibm.com/cgi-bin/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=IY16909

- 漏洞信息

5582
IBM AIX lsfs Environment Path Local Privilege Escalation
Local Access Required Input Manipulation, Other
Loss of Confidentiality, Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

AIX contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the command lsfs is installed with the SUID bit and calls commands modified by an attacker. This flaw may lead to a loss of confidentiality and/or integrity.

- 时间线

2001-02-23 Unknow
2001-02-23 Unknow

- 解决方案

Apply APAR IY16909 patch or upgrade to AIX 5.1 as both have been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround: Use the chmod -s command to remove the setuid bit from lsfs.

- 相关参考

- 漏洞作者

- 漏洞信息

AIX 'lsfs' Local Privilege Escalation Vulnerability
Design Error 6741
No Yes
2001-09-02 12:00:00 2009-07-11 08:06:00
This issue was announced by IBM.

- 受影响的程序版本

IBM AIX 4.3.3
IBM AIX 4.3.2
IBM AIX 4.3.1
IBM AIX 4.3
IBM AIX 5.1

- 不受影响的程序版本

IBM AIX 5.1

- 漏洞讨论

The lsfs utility, for IBM's AIX operating system, contains a vulnerability which could allow a malicious user to execute commands with elevated privileges. The problem occurs due to the implicit location defined when executing other system utlities.

By modifying shell environment it may be possible for the attacker to trick lsfs into running the attacker-supplied binary. As lsfs is installed setuid 'root', all commands executed using the described method would be done so with superuser privileges.

- 漏洞利用

This issue may be exploited by modifying the PATH environment variable so that a directory containing an attacker-supplied binary is searched before the location of the legitimate binary.

- 解决方案

IBM has released an APAR for AIX 4.3.3 which addresses this issue. Users are advised to upgrade as soon as possible.


IBM AIX 4.3.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站