- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 19794
- Проверка EDB
-
- Пройдено
- Автор
- KEYSER SOZE
- Тип уязвимости
- LOCAL
- Платформа
- LINUX
- CVE
- cve-2000-0206
- Дата публикации
- 2000-03-05
Oracle8i Standard Edition 8.1.5 for Linux Installer - Local Privilege Escalation
Код:
source: https://www.securityfocus.com/bid/1035/info
A vulnerability exists in the installation program for Oracle 8.1.5i. The Oracle installation scripts will create a directory named /tmp/orainstall, owned by oracle:dba, mode 711. Inside of this directory it will create a shell script named orainstRoot.sh, mode 777. The installation script will then stop and ask the person installing to run this script. The installation program at no point attempts to determine if the directory or script already exist. This makes it possible to create a symbolic link from the orainstRoot.sh file to elsewhere on the file system. This could be used to create a .rhosts file, for instance, and gain access to the root account. In addition, since the orainstRoot.sh file is mode 777, it is possible for any user on the machine to edit this script to execute arbitrary commands when run by root. Again, this can result in the compromise of the root account.
It is not readily apparent what versions of Oracle this does and does not affect. It has been confirmed on Oracle 8.1.5i, on the Linux/Intel platform.
mkdir /tmp/orainstall
ln -sf /.rhosts /tmp/orainstall/orainstRoot.sh
- Источник
- www.exploit-db.com