[6561] in bugtraq

home help back first fref pref prev next nref lref last post

smbmount problem?

daemon@ATHENA.MIT.EDU (Chris Evans)
Tue Apr 21 15:48:54 1998

Date: 	Tue, 21 Apr 1998 12:05:43 +0100
Reply-To: Chris Evans <chris@FERRET.LMH.OX.AC.UK>
From: Chris Evans <chris@FERRET.LMH.OX.AC.UK>
To: BUGTRAQ@NETSPACE.ORG

Hi,

smbmount is a linux program to mount NT filesystem shares.

/usr/sbin/smbmount //a/b /
/usr/sbin/smbmount must be installed suid root

Ohhh, that's nice. On my system (RH) it doesn't seem to be, which is
probably very lucky! I expect it might be suid on other distributions
maybe?

# export USER=`perl -e 'print "A" x 10000'`
# /usr/sbin/smbmount //a/b /
Segmentation fault

The buffer overflowed is on the stack, however it's of the form

struct a {
  .. blah ..
  char user[32];
  .. blah ..
};

int
main()
{
  struct a;

  strcpy (&a.user, getenv("USER"));
}


I am interested to know if we can do anything malicious with this, since
obviously the function "main" doesn't return and hand control to our
overwritten stack frame. The eventual segfault is from within libc.

Can someone enlighten us as to what use an overflow on the stack in
functiom main() is? Aleph? :-)

Cheers
Chris

home help back first fref pref prev next nref lref last post