[22520] in bugtraq
RE: hpux warez
daemon@ATHENA.MIT.EDU (Stefaan A Eeckels)
Tue Sep 4 12:27:58 2001
Message-ID: <XFMail.20010904172521.Stefaan.Eeckels@ecc.lu>
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
In-Reply-To: <200109031813.f83ID3G05409@mailserver1.hushmail.com>
Date: Tue, 04 Sep 2001 17:25:21 +0200 (MEST)
Reply-To: Stefaan A Eeckels <Stefaan.Eeckels@ecc.lu>
From: Stefaan A Eeckels <Stefaan.Eeckels@ecc.lu>
To: auto300526@hushmail.com
Cc: bugtraq@securityfocus.com
On 03-Sep-2001 auto300526@hushmail.com wrote:
>
> fully disclose this.
> I will leave you with this HPUX 11 local root exploit code. /usr/sbin/sw*
> are all setuid root by default and all contain buffer overflows. I didn't
> bother notifying HP about this at all. I just don't give a fuck.
I would if it worked. It doesn't.
$ ./swexploit
...lots of gunk...
,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~,€~
,€~,€~,€~,€~,€~,€~,€~,€~,€[" was found to be greater than 1024 bytes in length. This
program ERROR: Command line parsing failed.
$ uname -a
HP-UX happy B.11.00 A 9000/780 2016244097 two-user license
$
Stefaan
--
Please visit our Webster http://xxxxxxxx.xxxx.xxx, write or e-mail to X&x
promptly,if you are interested.And X&x shall be pleased to render you any
further services. -- Spam from China