VDB-67031 · OSVDB 23257

IBM CTSS 于 7094 Text Editor Password 信息公开

CVSS 元温度得分当前攻击价格 (≈)CTI兴趣分数
3.2$0-$5k0.00

IBM CTSS中曾发现一漏洞,此漏洞被评为棘手。 此漏洞会影响某些未知进程的组件Text Editor。 手动调试的不合法输入可导致 信息公开 (Password)。 漏洞的CWE定义是 CWE-200。 此漏洞的脆弱性 1970-01-03由公示人William D. Mathews、公示人所属公司MIT Libraries、公示人类型为Article (Website)所发布。 阅读公告的网址是larch-lcs.mit.edu。 供应商未曾参与此次公开发布。

攻击必须在本地进行。 无技术细节可用。 该漏洞的知名度高于平均水平, 此外还有一个漏洞可利用。 该漏洞利用已公开,可能会被利用。 当前漏洞利用的价值为美元大约是$0-$5k 。 根据MITRE ATT&CK,此问题部署的攻击技术是T1592。 该漏洞的历史影响是基于其背景和接受程度。 公告指出:

What happened was that on one afternoon at Project MAC where CTSS was being used as the main time-sharing workhorse, any user who logged in, found that instead of the usual message-of-the-day typing out on his terminal, he had the entire file of user passwords instead. This went on for fifteen or twenty minutes until one particularly conscientious user called up the system administrator and began the conversation with: "Did you know that...?" Needless to say there was general consternation with this colossal breach of security, the system was hastily shut down and the next twelve hours were spent heroically changing everyone's password.

它被宣布为proof-of-concept。 以下网址提供该漏洞利用:larch-lcs.mit.edu。 我们估计的零日攻击价值约为$0-$5k。 公告指出:

To simplify the organization of the initial CTSS system, a design decision had been made to have each user at a terminal associated with his own directory of files. Moreover the system itself was organized as a kind of quasi-user with its own directory that included a large number of supporting applications and files including the message-of-the day and the password file. So far, so good. Normally a single system programmer could login to the system directory and make any necessary changes. But the number of system programmers had grown to about a dozen in number, and, further, the system by then was being operated almost continuously so that the need to do live maintenance of the system files became essential. Not surprisingly, the system programmers saw the one-user-to-a-directory restriction as a big bottleneck for themselves. They thereupon proceeded to cajole me into letting the system directory be an exception so that more than one person at a time could be logged into it. They assured me that they would be careful to not make mistakes. But of course a mistake was made. Overlooked was a software design decision in the standard system text editor. It was assumed that the editor would only be used by one user at a time working in one directory so that a temporary file could have the same name for all instantiations of the editor. But with two system programmers editing at the same time in the system directory, the editor temporary files became swapped and the disaster occurred.

该漏洞被披露后,远在此前发表过可能的缓解措施。 公告包含以下备注:

One can draw two lessons from this: First, design bugs are often subtle and occur by evolution with early assumptions being forgotten as new features or uses are added to systems; and second, even skilled programmers make mistakes.

产品信息

供应商

名称

许可证

CPE 2.3信息

CPE 2.2信息

截屏

CVSSv4信息

VulDB CVSS-B Score: 🔍
VulDB CVSS-BT Score: 🔍
VulDB 向量: 🔍
VulDB 可靠性: 🔍

CVSSv3信息

VulDB 元基础分数: 3.3
VulDB 元温度得分: 3.2

VulDB 基本分数: 3.3
VulDB 温度得分: 3.2
VulDB 向量: 🔍
VulDB 可靠性: 🔍

CVSSv2信息

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
向量复杂度身份验证保密正直可用性
开锁开锁开锁开锁开锁开锁
开锁开锁开锁开锁开锁开锁
开锁开锁开锁开锁开锁开锁

VulDB 基本分数: 🔍
VulDB 温度得分: 🔍
VulDB 可靠性: 🔍

攻击信息

名称: Password
分类: 信息公开 / Password
CWE: CWE-200 / CWE-284 / CWE-266
ATT&CK: T1592

本地: 是
远程: 否

可用性: 🔍
访问: 公共
地位: Proof-of-Concept
作者: William D. Mathews
下载: 🔍
价格预测: 🔍
当前价格估算: 🔍

0-Day开锁开锁开锁开锁
今天开锁开锁开锁开锁

威胁情报信息

利益: 🔍
活跃演员: 🔍
活跃的 APT 团体: 🔍

对策信息

建议: 无已知缓解措施
地位: 🔍

0天时间: 🔍
利用延迟时间: 🔍

时间轴信息

1970-01-03 🔍
1970-01-03 +0 日 🔍
2014-07-11 +16260 日 🔍
2019-04-16 +1740 日 🔍

来源信息

供应商: ibm.com

公告: larch-lcs.mit.edu
研究人员: William D. Mathews
组织机构: MIT Libraries
地位: 已确认
OSVDB: 23257 - IBM 7094 CTSS System Text Editor Multiple Instance Password File Disclosure

scip Labs: https://www.scip.ch/en/?labs.20161013
其他: 🔍

条目信息

已创建: 2014-07-11 16時10分
已更新: 2019-04-16 10時59分
更改: 2014-07-11 16時10分 (55), 2019-04-16 10時59分 (1)
完整: 🔍

讨论

暂时没有任何评论。 语言: zh + en.

请登录后发表评论。

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!