vendor:
ifwatchd
by:
cenobyte
7,2
CVSS
HIGH
Setuid root ifwatchd watches for addresses added to or deleted from network interfaces and calls up/down scripts for them
264
CWE
Product Name: ifwatchd
Affected Version From: QNX 6.5.0SP1
Affected Version To: QNX 6.4.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: QNX 6.5.0SP1, QNX 6.5.0, QNX 6.4.1
2013
QNX 6.4.x/6.5.x ifwatchd local root exploit by cenobyte 2013
This exploit creates a fake arrival-script which will be executed as root by passing it to the -A parameter of /sbin/ifwatchd. The fake arrival-script copies /bin/sh to /tmp/shell and makes it setuid root. Once the setuid shell is in place ifwatchd will be killed to drop the user into the root shell.
Mitigation:
Ensure that ifwatchd is not setuid root and that it does not execute user-supplied scripts.