[18398] in bugtraq
Re: Remote Root Exploit for Redhat 7.0
daemon@ATHENA.MIT.EDU (Crutcher Dunnavant)
Tue Jan 2 18:38:26 2001
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id: <20010102155520.A1651@devserv.devel.redhat.com>
Date: Tue, 2 Jan 2001 15:55:20 -0500
Reply-To: Crutcher Dunnavant <crutcher@REDHAT.COM>
From: Crutcher Dunnavant <crutcher@REDHAT.COM>
X-To: "kry_cek@libero.it" <kry_cek@LIBERO.IT>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <G6DLIR$I_YawjoM5cUKNtdBTI6ZIhSJxkqRtJgk5Bo9bBJ8hVy@libero.it>;
from kry_cek@LIBERO.IT on Sat, Dec 30, 2000 at 11:08:51AM +0100
The following is the description of an errata issued 2000-09-26,
it concerns the LPRng syslog format hole which is discovered anew
once a week on bug-traq.
Descrition:
LPRng has a string format bug in the use_syslog function. This function
returns user input in a string that is passed to the syslog() function as
the format string. It is possible to corrupt the print daemon's execution
with unexpected format specifiers, thus gaining root access to the
computer. The vulnerability is theoretically exploitable both locally and
remotely.
The errata is published at:
http://www.redhat.com/support/errata/RHSA-2000-065-06.html
Please note that at the time of this errata's publication, no exploits were
known to exist, and that LPRng's upstream maintainers fixed this problem
with LPRng-3.6.25; thus, this problem was addressed in a timely manor by all
parties involved, and has been solved since last September.
++ 30/12/00 11:08 +0100 - kry_cek@libero.it:
> This exploit compromise Redhat 7.0 box and it allows to gain the root..
> is very dangerous.. please RedHat.com release a patch!!
> This expl take advantage of Lpd.
>
> For download this expl. look www.netcat.it/download/SEClpd.c
>
> Thx To All
> Staff of www.netcat.it
--
"I may be a monkey, Crutcher Dunnavant
but I'm a monkey <crutcher@redhat.com>
with ambition!" Red Hat OS Development