Vulnerabilities > CVE-2003-0289 - Unspecified vulnerability in Cdrtools Cdrecord 1.11/2.0

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
cdrtools
nessus
exploit available

Summary

Format string vulnerability in scsiopen.c of the cdrecord program in cdrtools 2.0 allows local users to gain privileges via format string specifiers in the dev parameter.

Vulnerable Configurations

Part Description Count
Application
Cdrtools
2

Exploit-Db

  • descriptionCDRTools CDRecord 1.11/2.0 Devname Format String Vulnerability. CVE-2003-0289. Local exploit for linux platform
    idEDB-ID:22594
    last seen2016-02-02
    modified2003-05-13
    published2003-05-13
    reporterCMN
    sourcehttps://www.exploit-db.com/download/22594/
    titleCDRTools CDRecord 1.11/2.0 Devname Format String Vulnerability
  • descriptionCdRecord Version. CVE-2003-0289. Local exploit for linux platform
    idEDB-ID:31
    last seen2016-01-31
    modified2003-05-14
    published2003-05-14
    reporterN/A
    sourcehttps://www.exploit-db.com/download/31/
    titleCdRecord <= 2.0 - Mandrake Local Root Exploit

Nessus

NASL familyMandriva Local Security Checks
NASL idMANDRAKE_MDKSA-2003-058.NASL
descriptionA vulnerability in cdrecord was discovered that can be used to obtain root access because Mandrake Linux ships with the cdrecord binary suid root and sgid cdwriter. Updated packages are provided that fix this vulnerability. You may also elect to remove the suid and sgid bits from cdrecord manually, which can be done by executing, as root : chmod ug-s /usr/bin/cdrecord This is not required to protect yourself from this particular vulnerability, however. Update : Two additional format string problems were discovered by Olaf Kirch and an updated patch has been applied to fix those problems as well.
last seen2020-06-01
modified2020-06-02
plugin id14042
published2004-07-31
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/14042
titleMandrake Linux Security Advisory : cdrecord (MDKSA-2003:058-1)
code
#%NASL_MIN_LEVEL 80502

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Mandrake Linux Security Advisory MDKSA-2003:058. 
# The text itself is copyright (C) Mandriva S.A.
#

include("compat.inc");

if (description)
{
  script_id(14042);
  script_version ("1.21");
  script_cvs_date("Date: 2019/08/02 13:32:46");

  script_cve_id("CVE-2003-0289");
  script_xref(name:"MDKSA", value:"2003:058-1");

  script_name(english:"Mandrake Linux Security Advisory : cdrecord (MDKSA-2003:058-1)");
  script_summary(english:"Checks rpm output for the updated packages");

  script_set_attribute(
    attribute:"synopsis", 
    value:
"The remote Mandrake Linux host is missing one or more security
updates."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"A vulnerability in cdrecord was discovered that can be used to obtain
root access because Mandrake Linux ships with the cdrecord binary suid
root and sgid cdwriter.

Updated packages are provided that fix this vulnerability. You may
also elect to remove the suid and sgid bits from cdrecord manually,
which can be done by executing, as root :

chmod ug-s /usr/bin/cdrecord

This is not required to protect yourself from this particular
vulnerability, however.

Update :

Two additional format string problems were discovered by Olaf Kirch
and an updated patch has been applied to fix those problems as well."
  );
  # http://marc.theaimsgroup.com/?l=bugtraq&m=105285564307225&w=2
  script_set_attribute(
    attribute:"see_also",
    value:"https://marc.info/?l=bugtraq&m=105285564307225&w=2"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected packages.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:cdrecord");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:cdrecord-cdda2wav");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:cdrecord-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:cdrecord-dvdhack");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mkisofs");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.0");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2003/05/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
  script_family(english:"Mandriva Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);


flag = 0;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"cdrecord-1.11-0.a31.1.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"cdrecord-cdda2wav-1.11-0.a31.1.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"cdrecord-devel-1.11-0.a31.1.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"cdrecord-dvdhack-1.11-0.a31.1.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"mkisofs-1.15-0.a31.1.3mdk", yank:"mdk")) flag++;

if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"cdrecord-1.11-0.a32.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"cdrecord-cdda2wav-1.11-0.a32.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"cdrecord-devel-1.11-0.a32.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"cdrecord-dvdhack-1.11-0.a32.3mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"mkisofs-1.15-0.a32.3mdk", yank:"mdk")) flag++;

if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"cdrecord-2.0-2.2mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"cdrecord-cdda2wav-2.0-2.2mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"cdrecord-devel-2.0-2.2mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"cdrecord-dvdhack-2.0-2.2mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.1", cpu:"i386", reference:"mkisofs-2.0-2.2mdk", yank:"mdk")) flag++;


if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");