CVE-2004-0126
CVSS4.6
发布时间 :2004-03-29 00:00:00
修订时间 :2008-09-05 16:37:36
NMCOS    

[原文]The jail_attach system call in FreeBSD 5.1 and 5.2 changes the directory of a calling process even if the process doesn't have permission to change directory, which allows local users to gain read/write privileges to files and directories within another jail.


[CNNVD]FreeBSD未授权受限进程挂接漏洞(CNNVD-200403-128)

        
        FreeBSD是一款免费开放源代码的UNIX操作系统。
        FreeBSD中在jail_attach(2)系统调用中存在一个访问验证问题,本地攻击者可以利用这个漏洞未授权访问其他受限制的进程。
        jail(2)系统调用允许系统管理员对进程进行限制,独立在一个封闭的环境中实现自身功能,可有效的提高系统安全。jail_attach(2)系统调用出现在FreeBSD 5中,允许非限制(non-jailed)的进程永久的移入已经存在的jail进程。
        由于在jail_attach(2)系统调用中存在一个编程错误,可影响系统调用验证调用进程的权限级别。如果调用的进程已经是受限制的,jail_attach(2)系统调用只在更改调用进程ROOT目录之后失败。
        在一个受限环境中的拥有超级用户权限的进程可以更改它的ROOT目录到不同的Jail环境中,因此可以在其他目标Jail环境中访问所有文件和目录。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:freebsd:freebsd:5.1FreeBSD 5.1
cpe:/o:freebsd:freebsd:5.2.1:release
cpe:/o:freebsd:freebsd:5.1:release
cpe:/o:freebsd:freebsd:5.2FreeBSD 5.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0126
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0126
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-128
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/9762
(VENDOR_ADVISORY)  BID  9762
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc
(VENDOR_ADVISORY)  FREEBSD  FreeBSD-SA-04:03
http://xforce.iss.net/xforce/xfdb/15344
(VENDOR_ADVISORY)  XF  freebsd-jailattach-gain-privileges(15344)
http://www.osvdb.org/4101
(UNKNOWN)  OSVDB  4101

- 漏洞信息

FreeBSD未授权受限进程挂接漏洞
中危 访问验证错误
2004-03-29 00:00:00 2005-05-13 00:00:00
本地  
        
        FreeBSD是一款免费开放源代码的UNIX操作系统。
        FreeBSD中在jail_attach(2)系统调用中存在一个访问验证问题,本地攻击者可以利用这个漏洞未授权访问其他受限制的进程。
        jail(2)系统调用允许系统管理员对进程进行限制,独立在一个封闭的环境中实现自身功能,可有效的提高系统安全。jail_attach(2)系统调用出现在FreeBSD 5中,允许非限制(non-jailed)的进程永久的移入已经存在的jail进程。
        由于在jail_attach(2)系统调用中存在一个编程错误,可影响系统调用验证调用进程的权限级别。如果调用的进程已经是受限制的,jail_attach(2)系统调用只在更改调用进程ROOT目录之后失败。
        在一个受限环境中的拥有超级用户权限的进程可以更改它的ROOT目录到不同的Jail环境中,因此可以在其他目标Jail环境中访问所有文件和目录。
        

- 公告与补丁

        厂商补丁:
        FreeBSD
        -------
        FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-04:03)以及相应补丁:
        FreeBSD-SA-04:03:Jailed processes can attach to other jails
        链接:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc
        补丁下载:
        FreeBSD FreeBSD 5.1 -RELEASE:
        FreeBSD Patch jail.patch
        ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:03/jail.patch
        FreeBSD FreeBSD 5.1:
        FreeBSD Patch jail.patch
        ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:03/jail.patch
        FreeBSD FreeBSD 5.2 -RELEASE:
        FreeBSD Patch jail.patch
        ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:03/jail.patch
        FreeBSD FreeBSD 5.2:
        FreeBSD Patch jail.patch
        ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:03/jail.patch

- 漏洞信息

4101
FreeBSD jail_attach() Privilege Escalation
Local Access Required, Remote / Network Access Infrastructure
Loss of Integrity

- 漏洞描述

FreeBSD contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is a flaw in the "jail_attach()" system call when verifying the privilege level of a calling process, which may permit a jailed process with superuser privileges to gain unauthorized access to other jails. This flaw may lead to a loss of integrity.

- 时间线

2004-02-25 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 5.2.1-RELEASE, or to the RELENG_5_2 or RELENG_5_1 security branch or higher, as it has been reported to fix this vulnerability. Also, FreeBSD has released a patch.

- 相关参考

- 漏洞作者

- 漏洞信息

FreeBSD Unauthorized Jailed Process Attaching Vulnerability
Access Validation Error 9762
No Yes
2004-02-27 12:00:00 2009-07-12 03:06:00
Discovery is credited to the JAS Group.

- 受影响的程序版本

FreeBSD FreeBSD 5.2.1 -RELEASE
FreeBSD FreeBSD 5.2 -RELEASE
FreeBSD FreeBSD 5.2
FreeBSD FreeBSD 5.1 -RELEASE
FreeBSD FreeBSD 5.1
FreeBSD FreeBSD 5.2.1 -RELEASE

- 不受影响的程序版本

FreeBSD FreeBSD 5.2.1 -RELEASE

- 漏洞讨论

A vulnerability was reported in FreeBSD that may permit a jailed process with superuser privileges to gain unauthorized access to other jails. This is due to an access validation issue in the jail_attach(2) system call.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

This issue has been addressed in the 5.2.1-RELEASE version of FreeBSD and in RELENG_5_2 or RELENG_5_1 security branches dated after 2004-02-19 23:26:39 UTC and 2004-02-25 20:03:35 UTC respectively.

Patches were also released.


FreeBSD FreeBSD 5.1 -RELEASE

FreeBSD FreeBSD 5.1

FreeBSD FreeBSD 5.2 -RELEASE

FreeBSD FreeBSD 5.2

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站