[8261] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ospf_monitor (Solaris 2.5)

daemon@ATHENA.MIT.EDU (Seth Michael McGann)
Fri Oct 23 17:18:57 1998

Date: 	Thu, 22 Oct 1998 00:55:48 -0400
Reply-To: Seth Michael McGann <smm@WPI.EDU>
From: Seth Michael McGann <smm@WPI.EDU>
X-To:         Joel Eriksson <na98jen@STUDENT.HIG.SE>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.SO4.4.02.9810212127350.27879-100000@stratus>

I can confirm that the version in FreeBSD 2.2.6 is indeed vulnerable, the
stack is smashed and we are root at the time :(.  Fortunately, it is not
executable by anyone but root or group ospf.  I would venture that solaris
x86 is vulnerable.  The exploit is trivial, just change the target in your
favorite local overflow and exec.

On Wed, 21 Oct 1998, Joel Eriksson wrote:

> This looks suspicious:
>
> bash$ ospf_monitor `perl -e 'print "A"x1066'`
> task_get_proto: getprotobyname("ospf") failed, using proto 89
> listening on 0.0.0.0.64527
> Segmentation Fault
>
> bash$ ls -l /usr/bin/ospf_monitor
> -rwsr-xr-x   1 root     other      61892 Sep 17  1997
> /usr/bin/ospf_monitor
>
> Has anyone succeded in exploiting this? It sure looks like a
> bufferoverflow to me..
>
> /Joel Eriksson

home help back first fref pref prev next nref lref last post