[13653] in bugtraq

home help back first fref pref prev next nref lref last post

Re: RedHat 6.1 /and others/ PAM

daemon@ATHENA.MIT.EDU (Ian Turner)
Wed Feb 2 12:12:44 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.10.10002011150590.11930-100000@crafter.house>
Date:         Tue, 1 Feb 2000 11:52:04 -0800
Reply-To: vectro@PIPELINE.COM
From: Ian Turner <vectro@PIPELINE.COM>
X-To:         Simple Nomad <thegnome@NMRC.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.10001311508260.1299-100000@blackhole.nmrc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 31 Jan 2000, Simple Nomad wrote:

> Trying to "echo PASSWORD | su ACCOUNT" will elicit a response of
> "standard in must be a tty..." therefore the sploit would stop on the
> first word in the list as if it was the correct password. Therefore I fail
> to see the exact sploit here. I tried this on a stock RH 6.1 machine.
>
> -         Simple Nomad          -  No rest for the Wicca'd  -
> -      thegnome@nmrc.org        -        www.nmrc.org       -
> -  thegnome@razor.bindview.com  -      www.bindview.com     -

You could create a more complicated exploit using ptty's. Basically su
checks if standard input is a tty because they don't want you using 'su'
in shell scripts. But you can still do it, it's just not as easy.

I'd contribute example code but I just woke up. :b

Ian
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE4lzlmfn9ub9ZE1xoRAvR4AKChxizjFxxUXwfzYWLSi0dU5TbPQwCfdkv6
VdKx0CkPQlnicXgsJDC+B3M=
=QjkA
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post