[7697] in bugtraq

home help back first fref pref prev next nref lref last post

Re: slackware-3.5 /bin/su buffer overflow

daemon@ATHENA.MIT.EDU (Rick Franchuk)
Tue Aug 18 12:16:41 1998

Date: 	Tue, 18 Aug 1998 08:48:02 -0700
Reply-To: rickf@TRANSPECT.NET
From: Rick Franchuk <rickf@TRANSPECT.NET>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.GSO.4.02A.9808181728090.3045-200000@Chaokhun.kmitl.ac.th>

On Tue, 18 Aug 1998, Chatchai Watchakit wrote:

> >From exploit4.c of Phrack 49 (P49-14) can exploit /bin/su of slackware-3.5
> kernel 2.0.34
>
> ---------------------
>
> endeavor:~$ gcc -o exploit4 exploit4.c
> endeavor:~$ ./exploit4
> Using address: 0xbffffb20
> bash$ /bin/su $RET
> bash#
>
> ---------------------

Tested on RH5.1 and Slackware 3.4, neither appear to be vulnerable to this
script as-is.

--
  __________________________________________
 |                                          |
 |  Rick Franchuk  -  TranSpecT Consulting  |
 |_______                            _______|
         \mailto:rickf@transpect.net/
          \_____ICQ_#_4435025______/

home help back first fref pref prev next nref lref last post