Linux LIDS Root Level Access When...

- AV AC AU C I A
发布: 2000-08-01
修订: 2025-04-13

A vulnerability exists in LIDS, the Linux Intrusion Detection System, version 0.9.7 for the 2.2.16 kernel. If LIDS is disabled using the 'security=0' option at boot time, all users logging in to the system will effectively be able to behave as root. All filesystem checks are disabled, and it is likely other privileged actions can also be performed. This vulnerability only exists on a grand scale if the system is boot with security=0. Using the lidadm program as follows: bash$ joe /etc/passwd (file is shown as readonly, cannot be modified) bash$ su Password: [root@penguin user]# /sbin/lidsadm -S -- -LIDS SWITCH enter password: [root@penguin user]#su user2 bash$ joe /etc/passwd (file is not read-only, can be modfied) bash$ joe /etc/fstab (file is not read only, can be modified) bash$ ls -l /etc/fstab -rw-r--r-- 1 root root 684 Jul 24 16:28 /etc/fstab bash$ exit [root@penguin user]#exit bash$ joe /etc/passwd (file is shown as readonly, cannot be modified) Will only result in LIDS...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息