[24668] in bugtraq

home help back first fref pref prev next nref lref last post

Re: zlibscan : script to find suid binaries possibly affected by zlib vulnerability

daemon@ATHENA.MIT.EDU (Bernd Jendrissek)
Wed Mar 13 18:25:05 2002

Date: Wed, 13 Mar 2002 14:24:05 +0200
From: Bernd Jendrissek <berndj@prism.co.za>
To: bugtraq@securityfocus.com
Message-ID: <20020313142405.A9365@prism.co.za>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii

In article <Pine.BSO.4.33.0203112131260.11537-100000@brained.org> hologram <holo@brained.org> wrote:
>The following is a quick shell script to find suid binaries that are
>potentially affected by the zlib vulnability (i.e., those dynamically
>linked).
>
>-[snip]-----------------------------------------------------------------
[snip again]

I'm more concerned about *statically* linked binaries, since dynamically
linked binaries should automagically use the patched libz when it is
installed.

# find / -type f -print0 |xargs -0 strings -af |grep '\(in\|de\)flate.*\(Gailly\|Adler\)'
(Apologies to Gailly and Adler.)

Besides the usual suspects (/usr/lib/libz*, etc.) here are some binaries I
would consider "sensitive":
> /bin/rpm
> /sbin/install-info
"Never install packages from untrusted sources"
> /sbin/sash
Understandable, sa == Stand-Alone
> lots of stuff under /usr/X11R6/bin - of course
> /usr/bin/rpm2cpio
> /usr/bin/cvs
So anoncvs can "fix" gcc to become like dmr's trusting-trust C compiler?
> /usr/bin/rsync
> /usr/lib/kaffe/libawt-1.0.6.so
> some stuff under /usr/lib/perl5
> /usr/sbin/pppdump
Now all you need to do is dial up and send some bogus compressed PPP?
Unlimited ISP access?  Neat!

Bernd Jendrissek

home help back first fref pref prev next nref lref last post