漏洞信息详情
NeXTstep /usr/etc/restore0.9 suid shell脚本漏洞
- CNNVD编号:CNNVD-199010-003
- 危害等级: 高危
![图片[1]-NeXTstep /usr/etc/restore0.9 suid shell脚本漏洞-一一网](https://www.proyy.com/skycj/data/images/2021-05-07/bbdd3e8868c10d22861b2275d65f4500.png)
- CVE编号:
CVE-1999-1392
- 漏洞类型:
未知
- 发布时间:
1990-10-03
- 威胁类型:
本地
- 更新时间:
2005-10-20
- 厂 商:
next - 漏洞来源:
-
漏洞简介
NeXT 1.0a和1.0版本中的restore0.9安装脚本存在漏洞。本地用户可以提升根特权。
漏洞公告
NeXT owners running Release 1.0 or 1.0a should remove
/usr/etc/restore0.9 from all disks. This file is installed by the
“BuildDisk” application, so it should be removed from all
systems built with the standard release disk, as well as from
the standard release disk itself (which will prevent the file
from being installed on system built with the standard
release disk in the future). You must be root to remove this
script, and the command that will remove the script is the
following:
# /bin/rm /usr/etc/restore0.9
参考网址
来源:CERT/CC Advisory: CA-1990-06
名称: CA-1990-06
链接:http://www.cert.org/advisories/CA-1990-06.html
来源: BID
名称: 9
链接:http://www.securityfocus.com/bid/9
来源: CIAC
名称: B-01
链接:http://ciac.llnl.gov/ciac/bulletins/b-01.shtml
来源: XF
名称: nextstep-restore09-root-access(7144)
链接:http://www.iss.net/security_center/static/7144.php







![LeetCode 数值的整数次方/递归乘法[递归]-一一网](https://www.proyy.com/wp-content/uploads/2024/10/load.gif )












![[桜井宁宁]COS和泉纱雾超可爱写真福利集-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/4d3cf227a85d7e79f5d6b4efb6bde3e8.jpg)

![[桜井宁宁] 爆乳奶牛少女cos写真-一一网](https://www.proyy.com/skycj/data/images/2020-12-13/d40483e126fcf567894e89c65eaca655.jpg)