The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Apache Local User to Root Escalation


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 26 Mar 2007 22:18:21 +0200
Subject: [UNIX] Apache Local User to Root Escalation
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070326200803.1794B5A0D@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Apache Local User to Root Escalation
------------------------------------------------------------------------


SUMMARY

A vulnerability in way debian's version of Apache handles cttys allows 
local users to gain elevated privileges if the root has manually restarted 
the Apache service.

DETAILS

Vulnerable Systems:
 * Apache version 1.3.34-4 (Debian only)

Unlike every other daemon, apache does not abdicate its controlling tty on 
startup, and allows it to be inherited by a cgi script (for example, a 
local user's CGI executed using suexec). When apache is manually 
restarted, the inherited ctty is the stdin of the (presumably root) shell 
that invoked the new instance of apache. Any process is permitted to 
invoke the TIOCSTI ioctl on the fd corresponding to its ctty, which allows 
it to inject characters that appear to come from the terminal master. 
Thus, a user created CGI script can inject and have executed any input 
into the shell that spawned apache.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:ret28@cam.ac.uk.> Richard 
Thrippleton.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру