[1761] in bugtraq

home help back first fref pref prev next nref lref last post

Ok.. who is backdooring /usr/bin/login on SunOS?

daemon@ATHENA.MIT.EDU (Alan B. Clegg)
Wed May 10 10:49:52 1995

Date: Wed, 10 May 1995 09:02:10 -0400 (EDT)
From: "Alan B. Clegg" <abc@arg.com>
To: bugtraq@fc.net

I have now come upon the 5th example of a 1s compliment passwords being 
put into /usr/bin/login on different systems... Each one has a different 
password, and not all act the same, some allowing you to get in with

	 any_userid+given_passwd==root_shell
		 and the other 
	real_userid+given_passwd==real_user_shell [including root]

One of the systems also has the 1s compliment string '/tmp/.tty'.. I have 
yet to see that file used.. is anyone familiar with these attacks?  I've 
looked [briefly, I admit] through the archives of bugtraq and can't find 
any notes on this one...

All of the systems so-compromised have been [at some point] running NCSA 
HTTP servers.  That is the only similar attack route that I have been 
able to pin down.  Is there a toolkit out there that hacks login via the 
http holes?

Other holes found on these systems:

			Older sendmail with ident code
			IFS hole for OpenWindows
			rdist holes

Any ideas?  [BTW, sorry to drag the list off of locating sniffers... 8-)]

-abc

The strongest reason for the people to retain  | Alan B. Clegg
 the right to keep and bear arms is, as a last | Information Systems Manager
 resort, to protect themselves against tyranny | American Research Group
 in government.            -- Thomas Jefferson |


home help back first fref pref prev next nref lref last post