[4356] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Overflow in xlock

daemon@ATHENA.MIT.EDU (Andrew G. Morgan)
Mon Apr 28 03:17:15 1997

Date: 	Sun, 27 Apr 1997 13:13:08 -0700
Reply-To: "Andrew G. Morgan" <morgan@PARC.POWER.NET>
From: "Andrew G. Morgan" <morgan@PARC.POWER.NET>
X-To:         staikos@0WNED.ORG
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.91.970426160718.1940A-100000@warrior.0wned.org> from
              "George Staikos" at Apr 26, 97 04:16:05 pm

George Staikos wrote:
> There appears to be an exploitable buffer overflow in xlock, the X based
> screensaver/locker.  Xlock is installed suid root on machines with
> shadowed passwords.  I have verified this on xlock versions on AIX 4.x and
> Linux (exploit for Linux posted below), but I cannot determine what

This is not a security problem with the xlock shipped with Red Hat linux.
Their PAM-enabled version is not setuid.  In principle, xlock can also
verify a user's shadowed password in this "unprivileged" state, using the
pam_pwdb module.

Cheers

Andrew
--
               Linux-PAM, libpwdb, Orange-Linux and Linux-GSS
                  http://parc.power.net/morgan/index.html
       [ For those that prefer FTP  ---  ftp://ftp.lalug.org/morgan ]

home help back first fref pref prev next nref lref last post