CVE-2005-1064
CVSS4.6
发布时间 :2005-04-10 00:00:00
修订时间 :2016-10-17 23:17:01
NMCOS    

[原文]The copy_symlink function in rsnapshot 1.2.0 and 1.1.x before 1.1.7 changes the ownership of files that a symlink points to rather than the symlink itself, which allows local users to obtain access to arbitrary files.


[CNNVD]RSnapshot本地文件许可操作漏洞(CNNVD-200504-012)

        rsnapshot是一个为本地或远程系统建立系统快照的命令行备份工具。它使用rsync和硬链接方式,就可以保持多个完整备份即时可用,而所需要的磁盘空间却只需要完全备份加上增量备份整个空间的一小部分。它可以根据设置,只需要花费几分钟的时间就可以将属于用户自己的文件完全恢复,而且不需要根 (root)用户的支持。但它并没能提供对磁带设备的支持,因为所有的备份任务都由它自动完成而不需要人为参与,并且,建立一些固定的系统快照,也可减少保存备份所需的磁盘空间。rsnapshot是用PERL编写的,因此它可以在所有的类UNIX系统下运行。
        rsnapshot 1.2.0和1.1.x中1.1.7之前版本的copy_symlink函数修改了symlink所指向的文件的属主而非修改symlink本身属主,本地用户可以借此获取任意文件的访问权。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1.4
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1.1
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.0.10
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.2
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1.6
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1.3
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1.5
cpe:/a:rsnapshot:filesystem_snapshot_utility:1.1.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1064
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1064
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200504-012
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=full-disclosure&m=111317179531000&w=2
(UNKNOWN)  FULLDISC  20050410 rsnapshot Security Advisory 001
http://securitytracker.com/id?1013674
(VENDOR_ADVISORY)  SECTRACK  1013674
http://www.gentoo.org/security/en/glsa/glsa-200504-12.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200504-12
http://www.rsnapshot.org/security/2005/001.html
(VENDOR_ADVISORY)  CONFIRM  http://www.rsnapshot.org/security/2005/001.html

- 漏洞信息

RSnapshot本地文件许可操作漏洞
中危 设计错误
2005-04-10 00:00:00 2005-10-20 00:00:00
本地  
        rsnapshot是一个为本地或远程系统建立系统快照的命令行备份工具。它使用rsync和硬链接方式,就可以保持多个完整备份即时可用,而所需要的磁盘空间却只需要完全备份加上增量备份整个空间的一小部分。它可以根据设置,只需要花费几分钟的时间就可以将属于用户自己的文件完全恢复,而且不需要根 (root)用户的支持。但它并没能提供对磁带设备的支持,因为所有的备份任务都由它自动完成而不需要人为参与,并且,建立一些固定的系统快照,也可减少保存备份所需的磁盘空间。rsnapshot是用PERL编写的,因此它可以在所有的类UNIX系统下运行。
        rsnapshot 1.2.0和1.1.x中1.1.7之前版本的copy_symlink函数修改了symlink所指向的文件的属主而非修改symlink本身属主,本地用户可以借此获取任意文件的访问权。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        rsnapshot filesystem snapshot utility 1.1
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.1.1
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.1.2
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.1.3
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.1.4
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.1.5
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.1.6
        rsnapshot rsnapshot 1.1.7
        http://www.rsnapshot.org/downloads/rsnapshot-1.1.7.tar.gz
        rsnapshot filesystem snapshot utility 1.2
        rsnapshot rsnapshot 1.2.1
        http://www.rsnapshot.org/downloads/rsnapshot-1.2.1.tar.gz
        

- 漏洞信息

15420
rsnapshot copy_symlink() Arbitrary File Ownership Modification
Local Access Required Race Condition
Loss of Integrity
Vendor Verified

- 漏洞描述

Rsnapshot contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is due to an error in the "copy_symlink()" function where file permissions for symlinks are incorrectly set on the original file. This flaw may allow an attacker to take ownership of arbitrary files by placing a malicious symlink in a directory being backed up, resulting in a loss of integrity.

- 时间线

2005-04-09 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.2.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

RSnapshot Local File Permission Manipulation Vulnerability
Design Error 13095
No Yes
2005-04-11 12:00:00 2009-07-12 12:56:00
The individual or individuals responsible for the discovery of this issue are currently unknown; the vendor disclosed this issue.

- 受影响的程序版本

rsnapshot filesystem snapshot utility 1.2
rsnapshot filesystem snapshot utility 1.1.6
rsnapshot filesystem snapshot utility 1.1.5
rsnapshot filesystem snapshot utility 1.1.4
rsnapshot filesystem snapshot utility 1.1.3
rsnapshot filesystem snapshot utility 1.1.2
rsnapshot filesystem snapshot utility 1.1.1
rsnapshot filesystem snapshot utility 1.1
rsnapshot filesystem snapshot utility 1.0.10
Gentoo Linux
rsnapshot filesystem snapshot utility 1.2.1
rsnapshot filesystem snapshot utility 1.1.7

- 不受影响的程序版本

rsnapshot filesystem snapshot utility 1.2.1
rsnapshot filesystem snapshot utility 1.1.7

- 漏洞讨论

A local file privileges manipulation vulnerability affects rsnapshot. This issue is due to a design error that causes the failure of the utility to properly assign permissions on files referenced by symbolic link files.

An attacker may leverage this issue to change the permissions on arbitrary files backed up by the affected utility. Specifically an attacker can claim ownership of the target file.

- 漏洞利用

No exploit is required to leverage this issue.

- 解决方案

The vendor has released upgrades dealing with this issue.

Gentoo has released advisory GLSA 200504-12 to address this issue. Please see the referenced advisory for more information.


rsnapshot filesystem snapshot utility 1.1

rsnapshot filesystem snapshot utility 1.1.1

rsnapshot filesystem snapshot utility 1.1.2

rsnapshot filesystem snapshot utility 1.1.3

rsnapshot filesystem snapshot utility 1.1.4

rsnapshot filesystem snapshot utility 1.1.5

rsnapshot filesystem snapshot utility 1.1.6

rsnapshot filesystem snapshot utility 1.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站