header-logo
Suggest Exploit
vendor:
Linux
by:
SecurityFocus
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Linux
Affected Version From: Corel Linux 1.0
Affected Version To: Corel Linux 1.0
Patch Exists: NO
Related CWE: N/A
CPE: o:corel:linux:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002

Several vulnerabilities exist in the buildxconfig program

By failing to check input to the -f and -x flags, it is possible for an attacker to append to existing files, or create files that previously didn't exist. Using the -f argument, and supplying a filename that does exist, it is possible to append information to a file. Using the -x argument, and a file that does exist, it is possible to replace the first line of any file with the path to the X server selected. Finally, if either flag is passed the name of a file that does not exist, it will create it, with read, write and execute permission available for all users on the system.

Mitigation:

Ensure that the buildxconfig program is not accessible to unauthorized users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/1007/info

Several vulnerabilities exist in the buildxconfig program, as included with Corel Linux 1.0. Using this program, it is likely that a local user could elevate privileges.

By failing to check input to the -f and -x flags, it is possible for an attacker to append to existing files, or create files that previously didn't exist. Using the -f argument, and supplying a filename that does exist, it is possible to append information to a file. Using the -x argument, and a file that does exist, it is possible toreplace the first line of any file with the path to the X server selected. Finally, if either flag is passed the name of a file that does not exist, it will create it, with read, write and execute permission available for all users on the system.

Method 1: buildxconfig -f /etc/shadow 

Method 2: buildxconfig -x /etc/passwd

Method 3: 
umask 0 
buildxconfig -x /.rhosts 
echo "+ +" > /.rhosts