Gentoo/Debian Linux 权限和访问控制漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1191533 漏洞类型 未知
发布时间 2007-03-02 更新时间 2007-03-02
CVE编号 CVE-2006-7094 CNNVD-ID CNNVD-200703-003
漏洞平台 N/A CVSS评分 8.5
|漏洞来源
https://www.securityfocus.com/bid/86842
https://cxsecurity.com/issue/WLB-2007030028
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200703-003
|漏洞详情
当被Gentoo和DebianLinux使用时,ftpd会在运行/bin/ls前将gid设置成有效的uid而不是有效的群id,这使得远程认证用户可以列出含有gid0特权的任意目录以及可能激活额外的攻击向量。
|漏洞EXP
Mea culpa. A stupid little bug crept into linux-ftpd for Debian, and
some other Linux distros. Some may have fixed it, but Debian hasn't.
The effect is that ftpd now runs /bin/ls (for DIR and similar commands)
with GID=0. Does not seem terribly dangerous as I do not seem able to
trick ls into running anything, nor are there any interesting objects
thusly accessible. Would become a "root hole" if someone finds a way
to execute anything from /bin/ls (as started from ftpd).

Please see

http://bugs.debian.org/384454

for details.

Cheers,

Paul Szabo   psz (at) maths.usyd.edu (dot) au [email concealed]   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia
|受影响的产品
Ftpd Ftpd 0
|参考资料

来源:bugs.gentoo.org
链接:http://bugs.gentoo.org/show_bug.cgi?id=155317
来源:BUGTRAQ
名称:20070220/bin/lswithgid=0inDebianlinux-ftpd
链接:http://www.securityfocus.com/archive/1/archive/1/460742/100/0/threaded
来源:packages.qa.debian.org
链接:http://packages.qa.debian.org/l/linux-ftpd/news/20061125T181702Z.html
来源:OSVDB
名称:34242
链接:http://osvdb.org/34242
来源:bugs.debian.org
链接:http://bugs.debian.org/384454
来源:SREASON
名称:2330
链接:http://securityreason.com/securityalert/2330