Article title: multiple critical vulnerabilities in Linuxswat. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Affected versions:
Samba 2.0.7
Unaffected versions:
Samba 2.0.9
Vulnerability description:
Swat is a service process included in Samba 2.0 and later servers. it allows administrators to perform configuration management on samba servers through the web interface. multiple Vulnerabilities exist in the swat service of Samba 2.0.7, seriously endangering system security.
(1) the user name and password of the system may be leaked. when a user logs on to the swat page, swat prompts the user to enter the user name and password. when the user enters the wrong user name, swat will give the information: 401 Bad Authorization username/password must be supplied, but when the user enters the correct user name but the password is incorrect, swat will be suspended for two seconds and then return the message: 401 Authorization Required You must be authenticated to use this service. in this way, attackers can obtain the user name in the system through different messages returned by swat, so that they can get the user's password step by step. because swat does not enable the log function, therefore, the attack process will not be recorded. if swat enables the log function, it will directly cause vulnerability 2. (test code 1)
(2) the log function is not enabled by default when the local user privilege is elevated to swat. if the log function is enabled, swat does not check whether the log file already exists, and overwrite any input from the client user, in this way, malicious local users can compete for temporary files to rewrite important files in the system. example: webmaster@isbase.combash2.02 $ ln-s/etc/passwd/tmp/cgi. log # first establish a connection webmaster@isbase.combash2.02 $ telnet localhost 901 # then log on to Port 901 (swat:
Toor: 0: 0: // bin/bash # input the above content, cut off the connection ctrl ^]: quit webmaster@isbase.combash2.02 $ cat/etc/passwd # view the/etc/passwd file
[Date: Mon, 31 Oct 2000 22:19:58 GMT localhost. localdomain (127.0.0.1)] toor: 0: 0: // bin/bash
Webmaster@isbase.combash2.02 $ su
Malicious users will be given root privileges. (Test procedure 2)
(3) enter an incorrect URL for a denial-of-service attack, such as hostname: 901? Badfile provides incorrect user name and password. swat will prompt Authentication Required and inetd will restart swat. if the system uses the netscape browser, netscape immediately retries the url and finally leads inetd to close the swat service for a long time.
Test method: (The following programs or methods may be offensive. if they are used for illegal purposes, the consequences are at your own risk !)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.