[24652] in bugtraq

home help back first fref pref prev next nref lref last post

zlibscan : script to find suid binaries possibly affected by zlib

daemon@ATHENA.MIT.EDU (hologram)
Tue Mar 12 23:27:32 2002

Date: Mon, 11 Mar 2002 21:36:35 -0500 (EST)
From: hologram <holo@brained.org>
To: <bugtraq@securityfocus.com>, <vulnwatch@vulnwatch.org>
Message-ID: <Pine.BSO.4.33.0203112131260.11537-100000@brained.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

Hi,

The following is a quick shell script to find suid binaries that are
potentially affected by the zlib vulnability (i.e., those dynamically
linked).

-[snip]-----------------------------------------------------------------

#!/bin/sh
# zlibscan by hologram <holo@brained.org>
# This will scan to find suid binaries potentially affected by the zlib
# vulnerablity. These are important directories for the Linux system,
# try different ones for other systems (i.e., /usr/etc, /usr/local/bin).
(ldd `find /bin -perm -4000` 2> /dev/null | grep zlib) > zlib.lst
(ldd `find /sbin -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst
(ldd `find /usr/bin -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst
(ldd `find /etc -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst
(ldd `find /var -perm -4000` 2> /dev/null | grep zlib) >> zlib.lst

-[snap]-----------------------------------------------------------------

- hologram



home help back first fref pref prev next nref lref last post