vendor:
by:
super
7.5
CVSS
HIGH
Local Privilege Escalation
CWE
Product Name:
Affected Version From: ncpfs 2.2.5
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2005
head1 Local Privilege Escalation
This exploit allows an attacker to escalate their privileges on a system by modifying the root's encrypted password. The exploit is specific to the ncpfs 2.2.5 version on Gentoo. It requires the attacker to have access to the system and execute the provided script. The script will create a temporary directory, modify the ~/.nwclient file, mount the directory using ncpmount, and then remove the temporary directory and restore the ~/.nwclient file. If successful, the attacker will have root privileges. For more details, refer to milw0rm.com.
Mitigation:
Upgrade to a patched version of ncpfs. Remove any unnecessary setuid/setgid binaries. Limit access to sensitive files and directories.