漏洞信息详情
Kerio WebStar本地权限提升漏洞
漏洞简介
Kerio WebSTAR是运行在Mac OS X平台上的WEB服务器。
Kerio WebSTAR在不安全的权限安装程序文件,本地攻击者可能利用此提升自己的权限。
在安装Kerio WebSTAR时/Applications中继承了两个setuid二进制程序:
kevin-finisterres-computer:~/Desktop kf$ find /Applications/Kerio\ WebSTAR -perm -4000 -ls
978790 3016 -rwsrwx--x 1 root admin 1542556 Apr 10 2006 /Applications/Kerio WebSTAR/AdminServer/WSAdminServer
979475 3288 -rwsrwx--- 1 root admin 1679724 Apr 10 2006 /Applications/Kerio WebSTAR/WebServer/WSWebServer
如果攻击者能够访问webstar用户或admin组的话,就可以通过滥用上述两个二进制程序以root用户权限执行代码。这两个二进制程序都试图加载当前目录中的帮助程序库,因此攻击者可以通过提供已植入了木马的应用程序来利用这个漏洞。
kevin-finisterres-computer:~ kf$ /Applications/Kerio\ WebSTAR/WebServer/WSWebServer
dyld: Library not loaded: libucache.dylib
Referenced from: /Applications/Kerio WebSTAR/WebServer/WSWebServer
Reason: image not found
Trace/BPT trap
kevin-finisterres-computer:~ kf$ /Applications/Kerio\ WebSTAR/AdminServer/WSAdminServer
dyld: Library not loaded: libucache.dylib
Referenced from: /Applications/Kerio WebSTAR/AdminServer/WSAdminServer
Reason: image not found
Trace/BPT trap
ktrace可以更清楚的说明这个漏洞:
1183 WSAdminServer CALL open(0x17e8,0,0)
1183 WSAdminServer NAMI \"libucache.dylib\"
1183 WSAdminServer RET open -1 errno 2 No such file or directory
1183 WSAdminServer CALL close(0xffffffff)
...
1183 WSAdminServer CALL open(0xbfffea90,0,0)
1183 WSAdminServer NAMI \"/var/root/lib/libucache.dylib\"
1183 WSAdminServer RET open -1 errno 2 No such file or directory
1183 WSAdminServer CALL close(0xffffffff)
1183 WSAdminServer RET close -1 errno 9 Bad file descriptor
1183 WSAdminServer CALL open(0xbfffea90,0,0)
1183 WSAdminServer NAMI \"/usr/local/lib/libucache.dylib\"
1183 WSAdminServer RET open -1 errno 2 No such file or directory
1183 WSAdminServer CALL close(0xffffffff)
1183 WSAdminServer RET close -1 errno 9 Bad file descriptor
1183 WSAdminServer CALL open(0xbfffeaa0,0,0)
1183 WSAdminServer NAMI \"/usr/lib/libucache.dylib\"
1183 WSAdminServer RET open -1 errno 2 No such file or directory
1183 WSAdminServer CALL close(0xffffffff)
漏洞公告
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.kerio.com/
参考网址
来源: XF
名称: kerio-webstar-privilege-escalation(30308)
链接:http://xforce.iss.net/xforce/xfdb/30308
来源: BID
名称: 21123
链接:http://www.securityfocus.com/bid/21123
来源: BUGTRAQ
名称: 20061116 Kerio WebSTAR local privilege escalation
链接:http://www.securityfocus.com/archive/1/archive/1/451832/100/200/threaded
来源: OSVDB
名称: 30450
链接:http://www.osvdb.org/30450
来源: VUPEN
名称: ADV-2006-4539
链接:http://www.frsirt.com/english/advisories/2006/4539
来源: MISC
链接:http://www.digitalmunition.com/DMA%5B2006-1115a%5D.txt
来源: SECTRACK
名称: 1017239
链接:http://securitytracker.com/id?1017239
来源: SECUNIA
名称: 22906
链接:http://secunia.com/advisories/22906
来源: SREASON
名称: 1921
链接:http://securityreason.com/securityalert/1921
受影响实体
- Kerio Webstar:5.3.3<!--2000-1-1-->
- Kerio Webstar:5.3.4<!--2000-1-1-->
- Kerio Webstar:5.3.1<!--2000-1-1-->
- Kerio Webstar:5.3.2<!--2000-1-1-->
- Kerio Webstar:5.3<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...