[22520] in bugtraq

home help back first fref pref prev next nref lref last post

RE: hpux warez

daemon@ATHENA.MIT.EDU (Stefaan A Eeckels)
Tue Sep 4 12:27:58 2001

Message-ID: <XFMail.20010904172521.Stefaan.Eeckels@ecc.lu>
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
In-Reply-To: <200109031813.f83ID3G05409@mailserver1.hushmail.com>
Date: Tue, 04 Sep 2001 17:25:21 +0200 (MEST)
Reply-To: Stefaan A Eeckels <Stefaan.Eeckels@ecc.lu>
From: Stefaan A Eeckels <Stefaan.Eeckels@ecc.lu>
To: auto300526@hushmail.com
Cc: bugtraq@securityfocus.com


On 03-Sep-2001 auto300526@hushmail.com wrote:
>  
>  fully disclose this.


> I will leave you with this HPUX 11 local root exploit code. /usr/sbin/sw* 
> are all setuid root by default and all contain buffer overflows. I didn't 
> bother notifying HP about this at all. I just don't give a fuck. 

I would if it worked. It doesn't.

$ ./swexploit
...lots of gunk...
,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~
,€~,€~,€~,€~,€~,€~,€~,€~,€[" was found to be greater than 1024 bytes in length.  This
         program ERROR:   Command line parsing failed. 
$ uname -a
HP-UX happy B.11.00 A 9000/780 2016244097 two-user license
$ 

Stefaan
-- 
Please visit our Webster http://xxxxxxxx.xxxx.xxx, write or e-mail to X&x
promptly,if you are interested.And X&x shall be pleased to render you any
further services.                                      -- Spam from China

home help back first fref pref prev next nref lref last post