[91] in Best-of-Security

home help back first fref pref prev next nref lref last post

BoS: 8.8.4 exploit

daemon@ATHENA.MIT.EDU (proff@suburbia.net)
Mon Mar 24 07:42:23 1997

From: proff@suburbia.net
Date: Mon, 24 Mar 1997 23:03:20 +1100 (EST)
Reply-To: best-of-security@suburbia.net
Errors-To: best-of-security-request@suburbia.net
To: best-of-security@suburbia.net
Resent-From: best-of-security@suburbia.net

> From:	C0WZ1LL4@NETSPACE.ORG
> To:	BUGTRAQ@NETSPACE.ORG

> Hello fellow mongoloids
> Try this:
> Make hard link of /etc/passwd to /var/tmp/dead.letter
> Telnet to port 25, send mail from some bad email address to some unreacheable hoost.
> Watch your message get appended to passwd.
> ie:
> cowzilla::0:0:c0wz1ll4 0wns u:/:/bin/sh
> 
> This is not good.  Worked with my 8.8.4, will probably also work with 8.8.5
> Root for the whole family
> 
> -Cowzilla the omnipotent b0v1n3
> PD
> Greets to various #2600 people
> 

Readers,
I haven't tested this one, and frankly I have my doubts. When I audited
8.6.12 the only *file access* problems related to group kmem - though it is
possibly of course that bad code has creeped it's way in since then.

--
Prof. Julian Assange  |If you want to build a ship, don't drum up people
		      |together to collect wood and don't assign them tasks
proff@suburbia.net    |and work, but rather teach them to long for the endless
proff@gnu.ai.mit.edu  |immensity of the sea. -- Antoine de Saint Exupery


home help back first fref pref prev next nref lref last post