[8262] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ospf_monitor (Solaris 2.5)

daemon@ATHENA.MIT.EDU (Seth Michael McGann)
Fri Oct 23 17:18:59 1998

Date: 	Thu, 22 Oct 1998 02:25:13 -0400
Reply-To: Seth Michael McGann <smm@WPI.EDU>
From: Seth Michael McGann <smm@WPI.EDU>
X-To:         Joel Eriksson <na98jen@STUDENT.HIG.SE>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.OSF.4.02A.9810220049520.20524-100000@reno.WPI.EDU>

On Thu, 22 Oct 1998, Seth Michael McGann wrote:

>
> I can confirm that the version in FreeBSD 2.2.6 is indeed vulnerable, the
> stack is smashed and we are root at the time :(.  Fortunately, it is not
> executable by anyone but root or group ospf.  I would venture that solaris
> x86 is vulnerable.  The exploit is trivial, just change the target in your
> favorite local overflow and exec.
>

I hate to reply to myself, but:

On further inspection, it appears ospf_monitor drops privileges after
opening a raw multicast socket, but before it overflows.  So basically, no
instant root, but you have an open raw socket descriptor, which could be
useful.  Ah well...

home help back first fref pref prev next nref lref last post