vendor:
Enterprise Linux
by:
nawok
7,2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Enterprise Linux
Affected Version From: RedHat 6.2
Affected Version To: RedHat 6.2
Patch Exists: NO
Related CWE: N/A
CPE: o:redhat:enterprise_linux:6.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: RedHat 6.2
2000
/sbin/restore exploit for rh6.2
This exploit is used to gain root access on RedHat 6.2 systems with /sbin/restore not “fucked up”. The exploit creates a shell script in the user’s home directory, which is then executed by the restore command. The script creates a copy of the /bin/sh binary in the user’s home directory and sets the setuid bit on it. This allows the user to gain root access.
Mitigation:
Restrict access to the restore command and ensure that it is not setuid.