[19007] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SuSe / Debian man package format string vulnerability

daemon@ATHENA.MIT.EDU (Nate Eldredge)
Mon Feb 5 14:39:19 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <14974.18987.333764.510569@mercury.st.hmc.edu>
Date:         Sun, 4 Feb 2001 22:37:31 -0800
Reply-To: Nate Eldredge <neldredge@HMC.EDU>
From: Nate Eldredge <neldredge@HMC.EDU>
X-To:         Jose Nazario <jose@BIOCSERVER.BIOC.CWRU.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.30.0102042328410.23404-100000@biocserver.BIOC.CWRU.Edu>

Jose Nazario writes:
 > On Sun, 4 Feb 2001, Martin Schulze wrote:
 >
 > > Please tell me what you gain from this.  man does not run setuid
 > > root/man but only setgid man.  So all you can exploit this to is a
 > > shell running under your ownl user ide.
 >
 > sucker admins who m4 their sendmail.mc's as root, chiefly if you trick
 > them into processing an untrusted and untrustworthy .mc file.

Umm... rather, if you can sucker them into processing a file named
"524t24y0%(%R&87963%n%n%n%n%n234t/bin/sh25r7u.mc" or something
similar.  The exploit requires a carefully crafted command line
argument.

If you can sucker them into processing an untrustworthy .mc file, they
are in trouble anyway:

#! /usr/bin/m4
syscmd(chmod 04755 /home/hax0r/sh)

--

Nate Eldredge
neldredge@hmc.edu

home help back first fref pref prev next nref lref last post