CVE-2002-0529
CVSS6.2
发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:28:15
NMCOS    

[原文]HP Photosmart printer driver for Mac OS X installs the hp_imaging_connectivity program and the hp_imaging_connectivity.app directory with world-writable permissions, which allows local users to gain privileges of other Photosmart users by replacing hp_imaging_connectivity with a Trojan horse.


[CNNVD]HP Photosmart Mac OS X打印驱动程序文件权限不正确漏洞(CNNVD-200208-086)

        
        HP Photosmart行式打印机是一款设计用于方便高效的打印数字图象的打印机,可使用在多种操作系统下,包括Mac OS X操作系统下。
        Mac OS X操作系统下的HP Photosmart行式打印机在安装驱动程序文件的时候存在漏洞,可导致攻击者进行符号连接攻击提升权限。
        HP Photosmart行式打印机在Mac OS X操作系统下安装驱动程序时,会以全局可写的方式安装二进制文件hp_imaging_connectivity,本地攻击者可以使用木马程序代替此程序或者使用符号连接连接到其他文件上,当任何人登录到系统的时候会执行这个程序,如果管理员登陆到系统,hp_imaging_connectivity就会以root权限执行,可能导致权限提升。
        

- CVSS (基础分值)

CVSS分值: 6.2 [中等(MEDIUM)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0529
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0529
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-086
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4518
(VENDOR_ADVISORY)  BID  4518
http://www.iss.net/security_center/static/8856.php
(VENDOR_ADVISORY)  XF  macos-photosmart-weak-permissions(8856)
http://archives.neohapsis.com/archives/bugtraq/2002-04/0169.html
(UNKNOWN)  BUGTRAQ  20020414 Vulnerability in HP Photosmart/Deskjet Drivers for Mac OS X (root compromise)

- 漏洞信息

HP Photosmart Mac OS X打印驱动程序文件权限不正确漏洞
中危 配置错误
2002-08-12 00:00:00 2005-10-20 00:00:00
本地  
        
        HP Photosmart行式打印机是一款设计用于方便高效的打印数字图象的打印机,可使用在多种操作系统下,包括Mac OS X操作系统下。
        Mac OS X操作系统下的HP Photosmart行式打印机在安装驱动程序文件的时候存在漏洞,可导致攻击者进行符号连接攻击提升权限。
        HP Photosmart行式打印机在Mac OS X操作系统下安装驱动程序时,会以全局可写的方式安装二进制文件hp_imaging_connectivity,本地攻击者可以使用木马程序代替此程序或者使用符号连接连接到其他文件上,当任何人登录到系统的时候会执行这个程序,如果管理员登陆到系统,hp_imaging_connectivity就会以root权限执行,可能导致权限提升。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 手工修改hp_imaging_connectivity文件属性,保证不可全局可写。
        厂商补丁:
        HP
        --
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.photosmart.com/

- 漏洞信息

7056
HP Photosmart Driver for Mac OS X hp_imaging_connectivity Privilege Escalation
Local Access Required Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

The HP Photosmart driver contains a flaw that may allow a malicious user to execute any file with root permissions. The driver installs a binary file (hp_imaging_connectivity.app) with world-writeable permissions. It is possible that the flaw may allow a user to replace the file with one of their own. This file is executed when a user logs into the system If root logs in, the file is executed with root permissions. This could result in a loss of integrity.

- 时间线

2002-04-14 Unknow
2002-04-14 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue. There are newer versions of the driver, however there has been no notice if the problem has been corrected or not.

- 相关参考

- 漏洞作者

- 漏洞信息

HP Photosmart Mac OS X Print Driver Weak File Permissions Vulnerability
Configuration Error 4518
No Yes
2002-04-15 12:00:00 2009-07-11 11:56:00
Discovered by Dr Andreas F Muller <afm@othello.ch>.

- 受影响的程序版本

HP Photosmart Print Driver for Mac OS X 1.2.1

- 漏洞讨论

The HP Photosmart line of printers are designed to allow easy and efficient printing of digital photographs. An issue has been reported in some versions of the Mac OS X driver for these printers.

The Mac OS X driver for the Photosmart printer includes the world writable binary file hp_imaging_connectivity. As it is world writable, any local user may replace it with a trojaned copy or a symbolic link to another file.

- 漏洞利用

No exploit is required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站