CVE-2002-0295
CVSS4.6
发布时间 :2002-05-31 00:00:00
修订时间 :2016-10-17 22:18:34
NMCOS    

[原文]Alcatel OmniPCX 4400 installs files with world-writable permissions, which allows local users to reconfigure the system and possibly gain privileges.


[CNNVD]Alcatel OmniPCX缺省文件权限漏洞(CNNVD-200205-119)

        
        OmniPCX是企业级的Personal Communications Exchange (PCX)系统,由Alcatel负责维护开发。
        缺省安装完成后,许多包含敏感信息的目录、文件允许所有人可写或组可写,比如
        /chetc/menus
        /chetc/msg
        /chetc/lck
        /etc/bootptab
        /etc/mnttab
        /etc/misc
        /fs
        /mnt
        /usr2
        /usr/ctsrv
        /usr/preserve
        /usr/tmp
        /usr2/soft_install
        结合"Alcatel OmniPCX系统缺省口令漏洞",攻击者可以获取系统管理权限。比如,以mtcl帐号登录,该帐号是tel组成员,
        > ls -l /chbin/pre_login
        42 -rwsrwxr-x 1 root tel 20096 Oct 9 1998 pre_login
        >
        攻击者可以修改/chbin/pre_login,以root身份执行任意命令。
        此外所有用户的.profile文件存在类似问题。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0295
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0295
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-119
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101413767925869&w=2
(UNKNOWN)  BUGTRAQ  20020219 Security BugWare : Alcatel 4400 PBX hack
http://www.securityfocus.com/bid/4133
(UNKNOWN)  BID  4133

- 漏洞信息

Alcatel OmniPCX缺省文件权限漏洞
中危 设计错误
2002-05-31 00:00:00 2005-10-20 00:00:00
本地  
        
        OmniPCX是企业级的Personal Communications Exchange (PCX)系统,由Alcatel负责维护开发。
        缺省安装完成后,许多包含敏感信息的目录、文件允许所有人可写或组可写,比如
        /chetc/menus
        /chetc/msg
        /chetc/lck
        /etc/bootptab
        /etc/mnttab
        /etc/misc
        /fs
        /mnt
        /usr2
        /usr/ctsrv
        /usr/preserve
        /usr/tmp
        /usr2/soft_install
        结合"Alcatel OmniPCX系统缺省口令漏洞",攻击者可以获取系统管理权限。比如,以mtcl帐号登录,该帐号是tel组成员,
        > ls -l /chbin/pre_login
        42 -rwsrwxr-x 1 root tel 20096 Oct 9 1998 pre_login
        >
        攻击者可以修改/chbin/pre_login,以root身份执行任意命令。
        此外所有用户的.profile文件存在类似问题。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 以root用户身份登陆,把这些敏感文件和目录的权限改为只能由root用户可读。
        厂商补丁:
        Alcatel
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.ind.alcatel.com/omnipcx/index.cfm?cnt=index

- 漏洞信息

12321
Alcatel OmniPCX 4400 Installation Permission Weakness

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-02-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Alcatel OmniPCX Default File Permissions World Writeable Vulnerability
Design Error 4133
No Yes
2002-02-19 12:00:00 2009-07-11 10:56:00
This vulnerability was announced in a Security Bugware Advisory on February 19, 2002.

- 受影响的程序版本

Alcatel-Lucent OmniPCX 4400 0

- 漏洞讨论

OmniPCX is an enterprise-level Personal Communications Exchange (PCX) system maintained and distributed by Alcatel.

Numerous directories and files on a OmniPCX system are world writeable. This is not inherently an issue, as OmniPCX systems are not designed for multi-user access. However, if a remote user gains access to a system via an unprivileged user account, or through one of the known login and password combinations described in Bugtraq ID 4127 "Alcatel OmniPCX Default Passwords Vulnerability," an unprivileged user may gain write access to configuration files.

Writeable files and directories include:

/chetc/menus
/chetc/msg
/chetc/lck
/etc/bootptab
/etc/mnttab
/etc/misc
/fs
/mnt
/usr2
/usr/ctsrv
/usr/preserve
/usr/tmp
/usr2/soft_install

- 漏洞利用

No exploit is required for this vulnerability.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站