Corel Linux buildxconfig漏洞

Corel Linux buildxconfig漏洞

漏洞ID 1105720 漏洞类型 输入验证
发布时间 2000-02-24 更新时间 2005-05-02
图片[1]-Corel Linux buildxconfig漏洞-安全小百科CVE编号 CVE-2000-0194
图片[2]-Corel Linux buildxconfig漏洞-安全小百科CNNVD-ID CNNVD-200002-067
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/19764
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200002-067
|漏洞详情
CorelLinuxbuildxconf存在漏洞。本地用户借助-x或-f参数可以修改或修改任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/1007/info

Several vulnerabilities exist in the buildxconfig program, as included with Corel Linux 1.0. Using this program, it is likely that a local user could elevate privileges.

By failing to check input to the -f and -x flags, it is possible for an attacker to append to existing files, or create files that previously didn't exist. Using the -f argument, and supplying a filename that does exist, it is possible to append information to a file. Using the -x argument, and a file that does exist, it is possible toreplace the first line of any file with the path to the X server selected. Finally, if either flag is passed the name of a file that does not exist, it will create it, with read, write and execute permission available for all users on the system.

Method 1: buildxconfig -f /etc/shadow 

Method 2: buildxconfig -x /etc/passwd

Method 3: 
umask 0 
buildxconfig -x /.rhosts 
echo "+ +" > /.rhosts
|参考资料

来源:BID
名称:1007
链接:http://www.securityfocus.com/bid/1007
来源:BUGTRAQ
名称:20000224CorelLinux1.0localrootcompromise
链接:http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html

相关推荐: CartWIZ 1.10 – ‘searchresults.asp’ idcategory Argument SQL Injection

CartWIZ 1.10 – ‘searchresults.asp’ idcategory Argument SQL Injection 漏洞ID 1055042 漏洞类型 发布时间 2005-04-23 更新时间 2005-04-23 CVE编号 N/A C…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享