[10798] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris 2.5 /bin/su [was: vulnerability in su/PAM in redhat]

daemon@ATHENA.MIT.EDU (Casper Dik)
Fri Jun 11 15:28:53 1999

Message-Id: <199906102040.WAA29728@romulus>
Date: 	Thu, 10 Jun 1999 22:40:51 +0200
Reply-To: Casper Dik <casper@HOLLAND.SUN.COM>
From: Casper Dik <casper@HOLLAND.SUN.COM>
X-To:         "Dr. Mudge" <mudge@L0PHT.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Thu, 10 Jun 1999 14:13:06 CDT." 
              <Pine.BSO.4.10.9906101400580.15608-100000@l0pht.com>

>The same sort of problem existed in solaris /bin/su on 2.5 and below.
>
>The comments in the quick proof of concept sploit below should explain
>further [heh - almost as high a comment/code ratio as Hobbit's netcat
>source :) ].


The version of Solaris that fixed this made several changes;
Instead of

	not trapping signals
	and Sorry/sleep/syslog

the new version traps (some) signals and reorders the
calls to syslog/sleep/Sorry.

Of course, since you started the process you can still kill -9 it but
you won't know whether you typed the right password until long after
syslog() logged the bad "su".

Casper

home help back first fref pref prev next nref lref last post