Kerio WebStar本地权限提升漏洞

漏洞信息详情

Kerio WebStar本地权限提升漏洞

漏洞简介

Kerio WebSTAR是运行在Mac OS X平台上的WEB服务器。

Kerio WebSTAR在不安全的权限安装程序文件,本地攻击者可能利用此提升自己的权限。

在安装Kerio WebSTAR时/Applications中继承了两个setuid二进制程序:

kevin-finisterres-computer:~/Desktop kf$ find /Applications/Kerio\ WebSTAR -perm -4000 -ls

978790 3016 -rwsrwx–x 1 root admin 1542556 Apr 10 2006 /Applications/Kerio WebSTAR/AdminServer/WSAdminServer

979475 3288 -rwsrwx— 1 root admin 1679724 Apr 10 2006 /Applications/Kerio WebSTAR/WebServer/WSWebServer

如果攻击者能够访问webstar用户或admin组的话,就可以通过滥用上述两个二进制程序以root用户权限执行代码。这两个二进制程序都试图加载当前目录中的帮助程序库,因此攻击者可以通过提供已植入了木马的应用程序来利用这个漏洞。

kevin-finisterres-computer:~ kf$ /Applications/Kerio\ WebSTAR/WebServer/WSWebServer

dyld: Library not loaded: libucache.dylib

Referenced from: /Applications/Kerio WebSTAR/WebServer/WSWebServer

Reason: image not found

Trace/BPT trap

kevin-finisterres-computer:~ kf$ /Applications/Kerio\ WebSTAR/AdminServer/WSAdminServer

dyld: Library not loaded: libucache.dylib

Referenced from: /Applications/Kerio WebSTAR/AdminServer/WSAdminServer

Reason: image not found

Trace/BPT trap

ktrace可以更清楚的说明这个漏洞:

1183 WSAdminServer CALL open(0x17e8,0,0)

1183 WSAdminServer NAMI \”libucache.dylib\”

1183 WSAdminServer RET open -1 errno 2 No such file or directory

1183 WSAdminServer CALL close(0xffffffff)

1183 WSAdminServer CALL open(0xbfffea90,0,0)

1183 WSAdminServer NAMI \”/var/root/lib/libucache.dylib\”

1183 WSAdminServer RET open -1 errno 2 No such file or directory

1183 WSAdminServer CALL close(0xffffffff)

1183 WSAdminServer RET close -1 errno 9 Bad file descriptor

1183 WSAdminServer CALL open(0xbfffea90,0,0)

1183 WSAdminServer NAMI \”/usr/local/lib/libucache.dylib\”

1183 WSAdminServer RET open -1 errno 2 No such file or directory

1183 WSAdminServer CALL close(0xffffffff)

1183 WSAdminServer RET close -1 errno 9 Bad file descriptor

1183 WSAdminServer CALL open(0xbfffeaa0,0,0)

1183 WSAdminServer NAMI \”/usr/lib/libucache.dylib\”

1183 WSAdminServer RET open -1 errno 2 No such file or directory

1183 WSAdminServer CALL close(0xffffffff)

漏洞公告

目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.kerio.com/

参考网址

来源: XF

名称: kerio-webstar-privilege-escalation(30308)

链接:http://xforce.iss.net/xforce/xfdb/30308

来源: BID

名称: 21123

链接:http://www.securityfocus.com/bid/21123

来源: BUGTRAQ

名称: 20061116 Kerio WebSTAR local privilege escalation

链接:http://www.securityfocus.com/archive/1/archive/1/451832/100/200/threaded

来源: OSVDB

名称: 30450

链接:http://www.osvdb.org/30450

来源: VUPEN

名称: ADV-2006-4539

链接:http://www.frsirt.com/english/advisories/2006/4539

来源: MISC

链接:http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt

来源: SECTRACK

名称: 1017239

链接:http://securitytracker.com/id?1017239

来源: SECUNIA

名称: 22906

链接:http://secunia.com/advisories/22906

来源: SREASON

名称: 1921

链接:http://securityreason.com/securityalert/1921

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享