[5425] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SNI-20: Telnetd tgetent vulnerability

daemon@ATHENA.MIT.EDU (Theo de Raadt)
Wed Oct 22 02:16:25 1997

Date: 	Tue, 21 Oct 1997 19:58:42 -0600
Reply-To: Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
From: Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
X-To:         "Secure Networks Inc." <sni@SILENCE.SECNET.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Tue, 21 Oct 1997 18:24:02 MDT." 
              <Pine.BSI.3.96.971021182323.367A-100000@silence.secnet.com>

> A vulnerability in the tgetent(3) library routine can result in a
> buffer overflow in the telnet daemon on some BSD derived systems.

This same problem appears to be exploitable as a localhost attack
against the program xterm.  This is setuid root on a lot of systems,
and if tgetent(3) has the overflow problems, the same problem can be
exploited there.

On BSD systems, it is likely this could also have been exploited in
systat(8) to gain gid kmem permissions.

I've not confirmed these probelms... I don't write shell code, I just
fix the bugs ;-)

home help back first fref pref prev next nref lref last post