[7578] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Solaris 2.4 pop buffer overrun

daemon@ATHENA.MIT.EDU (Matthew R. Potter)
Fri Aug 7 22:16:14 1998

Date: 	Fri, 7 Aug 1998 16:29:22 -0400
Reply-To: "Matthew R. Potter" <mpotter@KMFDM.SYSTEM.GIP.NET>
From: "Matthew R. Potter" <mpotter@KMFDM.SYSTEM.GIP.NET>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <3.0.32.19980805185505.030f1fcc@pop.mad.servicom.es>

At 06:55 PM 8/5/98 +0200, you wrote:
>An old one I guess known but I never saw it in the list:
>
>Solaris 2.4 popper has an overflow in the username explotaible obviously
>as root.
>It's also easy to get root's shadow entry in the core dumped just failing to
>log as root before overruning the username.

Depending on the revision level of 2.4 the dump will follow symolic and
hard links, So why wait to crack the root password when you can slam a few
files and get a full fledged uid of 0. core() is wack in pre 2.5.1(may 96)
versions.

Matt

home help back first fref pref prev next nref lref last post