[20479] in bugtraq

home help back first fref pref prev next nref lref last post

Re: IRIX /usr/lib/print/netprint local root symbols exploit.

daemon@ATHENA.MIT.EDU (Dale Southard)
Fri Apr 27 02:43:05 2001

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <ub6bspj6zy8.fsf@zonker.llnl.gov>
Date:         Thu, 26 Apr 2001 15:47:27 -0700
Reply-To: Dale Southard <southard1@LLNL.GOV>
From: Dale Southard <southard1@LLNL.GOV>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20010426055110.18258.qmail@securityfocus.com>

No news here.

The author's site indicates that he found the bug under IRIX 6.2.
That release of IRIX is around 5 years old.  SGI released a Security
Advisory on the netprint issue in December of 1996 which included
information on a patch which fixes it.  See SGI's security site at:

  http://www.sgi.com/support/security/index.html

I tested the exploit against a current IRIX release (6.5.11) and found
it not to be vulnerable.

Rule of thumb: If your sysadmin hasn't done an OS upgrade or applied
patches in over four years, there are likely to be some significant
security issues.



v9@REALHALO.ORG writes:

> i haven't audited anything in some time.  well, i
> just noticed this because i am doing a project
> with a name similar to "netprint" and i was
> wondering if it was at all related to what i was
> doing.  it wasn't.  but, i noticed it was setuid
> root and had a little bug.
>
> this bug takes advantage of the -n option witch
> has a bug that allows for arbitrary commands to be
> executed.
>
> exploit source code:
> http://realhalo.org/xnetprint.c
>
> Vade79 -> v9@realhalo.org -> realhalo.org.

--

/*  Dale Southard Jr.       southard1@llnl.gov        925-422-1463  */
/*  Computer Scientist, Accelerated Strategic Computing Initiative  */
/*  L-550,  Lawrence Livermore National Lab,  Livermore CA   94551  */
/*  AFF/I, SL/I, T/I, D-11216, Sr. Rig --- I'd rather be skydiving  */

home help back first fref pref prev next nref lref last post