Vulnerabilities > CVE-2005-3533 - Buffer Overflow vulnerability in Mike Neuman OSH Command Line Argument

047910
CVSS 7.2 - HIGH
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
low complexity
osh
nessus
exploit available

Summary

Buffer overflow in OSH before 1.7-15 allows local users to execute arbitrary code via a long current working directory and filename.

Vulnerable Configurations

Part Description Count
Application
Osh
1

Exploit-Db

  • descriptionOperator Shell (osh) 1.7-12 Local Root Exploit. CVE-2005-3533. Local exploit for linux platform
    idEDB-ID:788
    last seen2016-01-31
    modified2005-02-05
    published2005-02-05
    reporterCharles Stevenson
    sourcehttps://www.exploit-db.com/download/788/
    titleOperator Shell osh 1.7-12 - Local Root Exploit
  • descriptionOperator Shell (osh) 1.7-13 Local Root Exploit. CVE-2005-3533. Local exploit for linux platform
    idEDB-ID:1154
    last seen2016-01-31
    modified2005-08-16
    published2005-08-16
    reporterCharles Stevenson
    sourcehttps://www.exploit-db.com/download/1154/
    titleOperator Shell osh 1.7-13 - Local Root Exploit

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-918.NASL
descriptionSeveral security related problems have been discovered in osh, the operator
last seen2020-06-01
modified2020-06-02
plugin id22784
published2006-10-14
reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/22784
titleDebian DSA-918-1 : osh - programming error
code
#%NASL_MIN_LEVEL 80502

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-918. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include("compat.inc");

if (description)
{
  script_id(22784);
  script_version("1.17");
  script_cvs_date("Date: 2019/08/02 13:32:19");

  script_cve_id("CVE-2005-3346", "CVE-2005-3533");
  script_xref(name:"DSA", value:"918");

  script_name(english:"Debian DSA-918-1 : osh - programming error");
  script_summary(english:"Checks dpkg output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Several security related problems have been discovered in osh, the
operator's shell for executing defined programs in a privileged
environment. The Common Vulnerabilities and Exposures project
identifies the following vulnerabilities :

  - CVE-2005-3346
    Charles Stevenson discovered a bug in the substitution
    of variables that allows a local attacker to open a root
    shell.

  - CVE-2005-3533
    Solar Eclipse discovered a buffer overflow caused by the
    current working directory plus a filename that could be
    used to execute arbitrary code and e.g. open a root
    shell."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338312"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.debian.org/security/2005/dsa-918"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade the osh package.

For the old stable distribution (woody) these problems have been fixed
in version 1.7-11woody2.

For the stable distribution (sarge) these problems have been fixed in
version 1.7-13sarge1."
  );
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:osh");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2005/12/09");
  script_set_attribute(attribute:"plugin_publication_date", value:"2006/10/14");
  script_set_attribute(attribute:"vuln_publication_date", value:"2005/02/05");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"3.0", prefix:"osh", reference:"1.7-11woody2")) flag++;
if (deb_check(release:"3.1", prefix:"osh", reference:"1.7-13sarge1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");