Linux VServer Project可突破CHROOT环境漏洞

漏洞信息详情

Linux VServer Project可突破CHROOT环境漏洞

漏洞简介

Linux-VServer是一个允许用户在一个普通的Linux服务器上建立虚拟专用的服务器的软件。
Linux-VServer存在典型的\”chroot-again\”问题,本地攻击者可以利用这个漏洞以ROOT用户权限在系统上执行任意指令。
主要问题是VServer应用程序针对\”chroot-again\”类型的攻击没有很好的进行安全保护,攻击者可以利用这个漏洞脱离限制环境,访问限制目录之外的任意文件。

漏洞公告

厂商补丁:
Debian
——
Debian已经为此发布了一个安全公告(DSA-1011-1)以及相应补丁:

DSA-1011-1:New kernel-patch-vserver packages fix root exploit

链接:http://www.debian.org/security/2005/dsa-1011” target=”_blank”>
http://www.debian.org/security/2005/dsa-1011

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.dsc

Size/MD5 checksum: 637 415731be72a9cd966e2fdb5d4f408c4a

http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5.tar.gz

Size/MD5 checksum: 950447 fe6b34612095d2fbdbaab5aefbd83264

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.dsc” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.dsc

Size/MD5 checksum: 752 e32069a5ca2ef2bc87794cd6c2160821

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.diff.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3.diff.gz

Size/MD5 checksum: 115947 d0bb2cd998a73905189ee24b5f46dd0d

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204.orig.tar.gz” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204.orig.tar.gz

Size/MD5 checksum: 677831 b315f375b1cef48da1b644dec18f22bd

Architecture independent components:

http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5_all.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/k/kernel-patch-vserver/kernel-patch-vserver_1.9.5.5_all.deb

Size/MD5 checksum: 436934 b50048ea819d150d660ed96e3988613b

Alpha architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_alpha.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_alpha.deb

Size/MD5 checksum: 600660 e52fe0ff93e4c9ca7d58fe8386ebab5a

AMD64 architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_amd64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_amd64.deb

Size/MD5 checksum: 429530 c4155982844c085b7d9bc59d7eaa02c4

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_i386.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_i386.deb

Size/MD5 checksum: 398794 56831faa6fa6d76c601fee78251f50eb

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_ia64.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_ia64.deb

Size/MD5 checksum: 640332 ab2b2e4283ca5b62c9d9cf5776b6dadb

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mips.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mips.deb

Size/MD5 checksum: 612918 e4a60532f25ce776880261de79278e85

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mipsel.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_mipsel.deb

Size/MD5 checksum: 614152 f3aee29aad2682878f8ed22064f3fafa

PowerPC architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_powerpc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_powerpc.deb

Size/MD5 checksum: 425444 9a7542249c2b70661abab2afd5270462

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_s390.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_s390.deb

Size/MD5 checksum: 440880 376560971a0d2db4bfd51beb67d42bff

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_sparc.deb” target=”_blank”>
http://security.debian.org/pool/updates/main/u/util-vserver/util-vserver_0.30.204-5sarge3_sparc.deb

Size/MD5 checksum: 395640 51e24ac4754b1aa41277378ee9271a1f

补丁安装方法:

1. 手工安装补丁包:

首先,使用下面的命令来下载补丁软件:

# wget url (url是补丁下载链接地址)

然后,使用下面的命令来安装补丁:

# dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

首先,使用下面的命令更新内部数据库:

# apt-get update

然后,使用下面的命令安装更新软件包:

# apt-get upgrade
VServer
——-
http://www.debian.org/security/2006/dsa-1011” target=”_blank”>
http://www.debian.org/security/2006/dsa-1011

参考网址

来源: www.linux-vserver.org
链接:http://www.linux-vserver.org/index.php?page=ChangeLog

来源: XF
名称: linux-vserver-gain-privileges(15073)
链接:http://xforce.iss.net/xforce/xfdb/15073

来源: BID
名称: 9596
链接:http://www.securityfocus.com/bid/9596

来源: BUGTRAQ
名称: 20040206 Linux 2.4.24 with vserver 1.24 exploit
链接:http://www.securityfocus.com/archive/1/353003

来源: OSVDB
名称: 3875
链接:http://www.osvdb.org/3875

来源: SECUNIA
名称: 10816
链接:http://secunia.com/advisories/10816

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享