CVE-2004-0157
CVSS4.6
发布时间 :2004-06-01 00:00:00
修订时间 :2008-09-05 16:37:40
NMCOPS    

[原文]x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.


[CNNVD]Xonix X11游戏不安全权限漏失漏洞(CNNVD-200406-001)

        xonix 1.4及其早期版本的x11.c使用当前的工作目录发现和执行rmail程序。本地用户通过修改指向恶意rmail程序的路径执行任意代码。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0157
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0157
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200406-001
(官方数据源) CNNVD

- 其它链接及资源

http://www.debian.org/security/2004/dsa-484
(VENDOR_ADVISORY)  DEBIAN  DSA-484
http://xforce.iss.net/xforce/xfdb/15873
(UNKNOWN)  XF  xonix-privilege-dropping(15873)
http://www.securityfocus.com/bid/10149
(UNKNOWN)  BID  10149
http://www.osvdb.org/5358
(UNKNOWN)  OSVDB  5358
http://shellcode.org/Advisories/XONIX.txt
(UNKNOWN)  MISC  http://shellcode.org/Advisories/XONIX.txt
http://securitytracker.com/id?1009789
(UNKNOWN)  SECTRACK  1009789
http://secunia.com/advisories/11382
(UNKNOWN)  SECUNIA  11382

- 漏洞信息

Xonix X11游戏不安全权限漏失漏洞
中危 设计错误
2004-06-01 00:00:00 2005-10-28 00:00:00
本地  
        xonix 1.4及其早期版本的x11.c使用当前的工作目录发现和执行rmail程序。本地用户通过修改指向恶意rmail程序的路径执行任意代码。

- 公告与补丁

        Debian has released an advisory DSA 484-1 to address this issue. Please see the referenced advisory for more information.
        xonix xonix 1.4
        

- 漏洞信息 (F33091)

dsa-484.txt (PacketStormID:F33091)
2004-04-15 00:00:00
Matt Zimmerman  debian.org
advisory,local
linux,debian
CVE-2004-0157
[点击下载]

Debian Security Advisory DSA 484-1 - Steve Kemp discovered a vulnerability in xonix, a game, where an external program was invoked while retaining setgid privileges. A local attacker could exploit this vulnerability to gain gid games.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 484-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
April 14th, 2004                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : xonix
Vulnerability  : failure to drop privileges
Problem-Type   : local
Debian-specific: no
CVE Ids        : CAN-2004-0157

Steve Kemp discovered a vulnerability in xonix, a game, where an
external program was invoked while retaining setgid privileges.  A
local attacker could exploit this vulnerability to gain gid "games".

For the current stable distribution (woody) this problem will be fixed
in version 1.4-19woody1.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you update your xonix package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

	http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1.dsc
      Size/MD5 checksum:      586 6f26d5b08dbeadab0cfe72724e4a7f7f
    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1.diff.gz
      Size/MD5 checksum:     5738 60429284d637729799c230d18e301d55
    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4.orig.tar.gz
      Size/MD5 checksum:    44533 c53a8d9dcdb44a6e62a63913dc9e2610

  Alpha architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_alpha.deb
      Size/MD5 checksum:    28266 8182ecc198a51bba3556d5222835437c

  ARM architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_arm.deb
      Size/MD5 checksum:    25188 abfc1957fe2ac0adef9562b06037156b

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_i386.deb
      Size/MD5 checksum:    23256 a8dd1ba031684de6cf4c80749217c3eb

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_ia64.deb
      Size/MD5 checksum:    34190 0b3a3255f062aa83945633a51f3c3fe5

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_hppa.deb
      Size/MD5 checksum:    26540 b54c3819a331ae6c5b5bd0345bff14dd

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_m68k.deb
      Size/MD5 checksum:    22524 c504fbffd9b8f12d529ee89e0bdd24c0

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_mips.deb
      Size/MD5 checksum:    26532 3189246548f72ea3bfec76785b890735

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_mipsel.deb
      Size/MD5 checksum:    26376 78365a237af4c9b0a1d2682071a66b55

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_powerpc.deb
      Size/MD5 checksum:    24944 fa8a7607397c1569806bd00c0870c3df

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_s390.deb
      Size/MD5 checksum:    25754 c6c0c542a92be4962b6ba26510ee5588

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/x/xonix/xonix_1.4-19woody1_sparc.deb
      Size/MD5 checksum:    27086 1a1cfb8adeb548358dda307c83c54d53

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security/dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAfdyHArxCt0PiXR4RAnpZAJ0buaDqhCi+sEUr/nR2wRrJBMv0rgCeJ9Y1
YphpCQD293Ax9PHm/iGZ2yA=
=xXJ0
-----END PGP SIGNATURE-----
    

- 漏洞信息

5358
xonix Mailer Privilege Escalation
Local Access Required Other
Loss of Confidentiality, Loss of Integrity
Exploit Unknown

- 漏洞描述

xonix contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the application calls an external mail application without dropping privileges. This flaw may lead to a loss of confidentiality, integrity and/or availability.

- 时间线

2004-04-15 2004-04-15
Unknow Unknow

- 解决方案

Upgrade to version 1.4-20 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Xonix X11 Game Insecure Privilege Dropping Vulnerability
Design Error 10149
No Yes
2004-04-15 12:00:00 2009-07-12 04:06:00
Discovery is credited to Steve Kemp.

- 受影响的程序版本

xonix xonix 1.4

- 漏洞讨论

It has been reported that Xonix is prone to a vulnerability that may allow an attacker to gain elevated privileges. This issue occurs because the application fails to drop privileges. Successful exploitation of this issue may result in a local attacker gaining gid 'games' privileges.

This issue has been reported to affect Xonix version 1.4, however, it is possible that other versions are affected as well.

Due to a lack of details, further information is not available at the moment. This BID will be updated as more information becomes available.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Debian has released an advisory DSA 484-1 to address this issue. Please see the referenced advisory for more information.


xonix xonix 1.4

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站