Majordomo局部重发漏洞

漏洞信息详情

Majordomo局部重发漏洞

漏洞简介

Majordomo中的重发命令存在漏洞,本地用户利用该漏洞通过shell元字符获得特权。

漏洞公告

Perl programmers are advised to use sysopen() as opposed to open() for security reasons.
A patch submitted by “Todd C. Miller” to Bugtraq on December 29, 1999 is listed below:
— resend Thu Aug 19 10:12:03 1999
+++ resend+ Tue Dec 28 23:55:39 1999
@@ -58,7 +58,7 @@
if ($ARGV[0] =~ /^\@/) {
$fn = shift(@ARGV);
$fn =~ s/^@//;
– open(AV, $fn) || die(“open(AV, \”$fn\”): $!\nStopped”);
+ sysopen(AV, $fn, O_RDONLY) || die(“sysopen(AV, \”$fn\”, O_RDONLY): $!\nStopped”);
undef($/); # set input field separator
$av = ; # read whole file into string
close(AV);
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.
@courtesan.com>

参考网址

来源: BID
名称: 902
链接:http://www.securityfocus.com/bid/902

来源: BUGTRAQ
名称: 20000113 Info on some security holes reported against SCO Unixware.
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=94780294009285&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享