The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Privilege Escalation Vulnerabilities in W-Channel Embedded Linux


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 22 Nov 2004 15:59:15 +0200
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Subject: [UNIX] Privilege Escalation Vulnerabilities in W-Channel Embedded Linux

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  Privilege Escalation Vulnerabilities in W-Channel Embedded Linux
------------------------------------------------------------------------


SUMMARY

 <http://www.tc-ide.com/eng/tcs-features.htm>; W-Channel produces an 
embedded Linux system that can turn existing PCs into thin terminal 
clients. By plugging the TC-IDE into the IDE socket of the PC, the PC will 
be booted by the embedded kernel, with terminal protocols (RDC, VNC 
X-Windows etc).

Local user input handling vulnerabilities exist in WCI's TC-IDE Embedded 
Linux that allow local users with access to the tools provided with the 
system to spawn a root console, gaining full control over the running 
Linux operating system.

DETAILS

Vulnerable Systems:
 * W-Channel Embedded Linux version 1.53 and prior

Immune Systems:
 * W-Channel Embedded Linux version 1.54 or newer

Several exploitation methods are explained below:

1) In the Net Tools dialog, type ";crxvt&" (without the quotes), and click 
on Discover. A root shell within a virtual terminal should appear.

2) In the PPPoE dialer GUI, type the same as above in the username field, 
and click connect.

3) In Opera, click on Menu, then Preferences. In E-mail, mark the "Use 
specific e-mail client" radio button, and type "/bin/dillo" (without the 
quotes) in the textbox below. Apply the settings, and close this menu. In 
the main window, click on Mail, then Compose. The dillo browser window 
should now be launched.

4) Point it to the following address: 
http://localhost/cgi-bin/mycomputer.cgi. Go to the Control Panel -> User 
Desktop. Enable "My Computer", then restart your desktop.

You should now have Administrator access to most of the settings.

Vendor Status:
The security problems were fixed in v1.54, Customers should contact 
W-Channel for information on how to obtain the latest firmware.

Disclosure Timeline:
 * Vendor informed: 15/10/04
 * Vendor reply: 17/10/04
 * Vendor fix release: 8/11/04


ADDITIONAL INFORMATION

The information has been provided by  <mailto:team@eclipse.org.il.> ECL 
team.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру