[21112] in bugtraq

home help back first fref pref prev next nref lref last post

Re: pmpost - another nice symlink follower

daemon@ATHENA.MIT.EDU (Damian Menscher)
Wed Jun 20 08:50:22 2001

Date: Wed, 20 Jun 2001 01:55:51 -0500 (CDT)
From: Damian Menscher <menscher@uiuc.edu>
Reply-To: Damian Menscher <menscher@uiuc.edu>
To: <bugtraq@securityfocus.com>
In-Reply-To: <20010619093557.A20737@ii.uib.no>
Message-ID: <5705323910D7D2118E3400C00D0062C1A8C7CA-100000@phyexha.physics.uiuc.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

On Tue, 19 Jun 2001, Jan-Frode Myklebust wrote:
> On Mon, Jun 18, 2001 at 07:11:20PM +0200, Paul Starzetz wrote:
> > there is a symlink handling problem in the pcp suite from SGI. The
> > binary pmpost will follow symlinks, if setuid root this leads to instant
> > root compromise, as found on SuSE 7.1 (I doubt that this a default SuSE
> > package, though).
>
> It's probably a very rare package under linux, but
> more common under IRIX. I just tested your exploit
> against SGI's binary release of PCP 2.1 under IRIX
> 6.5.12m, and it worked just fine (after minor fixes).

Comparing notes with Jan-Frode indicated that SGI has released more than
one version of PCP 2.1.  Not all versions are vulnerable (PCP 2.1 under
6.5.6m was not).  One way to check if you're vulnerable is to do a:

	strings /usr/pcp/bin/pmpost | grep PCP_LOG_DIR

If this string appears, you're vulnerable.  If it doesn't, you're
probably not.  Of course, to be safe you could always do the chmod.

Damian Menscher
-- 
--==## Grad. student & Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## <menscher@uiuc.edu> www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--


home help back first fref pref prev next nref lref last post