[8156] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Overflow in zgv-4.1?

daemon@ATHENA.MIT.EDU (Paul Boehm)
Fri Oct 9 14:56:21 1998

Date: 	Fri, 9 Oct 1998 14:58:50 +0200
Reply-To: Paul Boehm <pb@INSECURITY.NET>
From: Paul Boehm <pb@INSECURITY.NET>
X-To:         onix <onix@AUTOBAHN.MB.CA>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.96.981007235716.11535A-100000@onix>; from onix on
              Thu, Oct 08, 1998 at 12:08:13AM -0500

On Thu, Oct 08, 1998 at 12:08:13AM -0500, onix wrote:
> Possible security risk in setuid zgv 4.1 which may lead to local root
> comprimise.  zgv is installed setuid root by default.
--snip--

i found this overrun some months ago and even tried to exploit it...
all i got was a shell with MY uid... then i posted it to the security
auditing mailinglist and Alan Cox pointed out that vga_init() drops
root privileges.. all you can gain from this overrun is video display access.

for the whole thread check out the secau mailinglist archives at
   http://science.nas.nasa.gov/Pubs/Mail/archive/linux-security-audit/
or http://www2.merton.ox.ac.uk/~security/

bye,
    paul

PS: you can also overflow zgv using an overlong HOME enviroment variable.

--
.----------------------------------------------------------------------.
| mail: pb@insecurity.net   :: url: http://paul.boehm.org               |
| irc:  infected            :: pgp: finger pb@insecurity.net | pgp -fka |
 \.....Linux is like a wigwam - no windows, no gates, apache inside..../

home help back first fref pref prev next nref lref last post