Date: Sat, 08 Sep 2001 15:34:48 -0400 From: Mike Tancsa <mike@sentex.net> To: security@freebsd.org Subject: Fwd: Multiple vendor 'Taylor UUCP' problems. Message-ID: <5.1.0.14.0.20010908153417.0286b4b8@192.168.0.12>
next in thread | raw e-mail | index | archive | help
I imagine FreeBSD is vulnerable to this was well :-( ---Mike >Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm >List-Id: <bugtraq.list-id.securityfocus.com> >List-Post: <mailto:bugtraq@securityfocus.com> >List-Help: <mailto:bugtraq-help@securityfocus.com> >List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com> >List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com> >Delivered-To: mailing list bugtraq@securityfocus.com >Delivered-To: moderator for bugtraq@securityfocus.com >Date: Sat, 8 Sep 2001 22:58:39 +1200 (NZST) >From: zen-parse <zen-parse@gmx.net> >X-X-Sender: <zen-parse@clarity.local> >To: <bugtraq@securityfocus.com> >Subject: Multiple vendor 'Taylor UUCP' problems. > >******************* Brief description ************* > > Due to incorrect argument handling in a component of the > Taylor UUCP package, it is possible for local users to > gain uid/gid uucp. > > This may allow further elevation, depending on the system, > up to and including root access. > > On OpenBSD 2.8 (and probably others) it allows root compromise. > By overwriting the uucp owned program /usr/bin/uustat, arbitrary > commands may be executed as part of the /etc/daily crontab script. > > On Redhat 7.0 (and probably others) it allows creation of empty > files as root, and the ability to execute commands as if logged > in at the console (as checked via /lib/security/pam_console.so). > This may also allow further elevation of privileges, or denial of > service. (Tested against uucp-1.06.1-25) > > Other systems running this package are also affected to > a greater or lesser degree. > >*********************** Solution ****************** > >Patches should be available very soon, if not already, for most >affected systems. > >If you do not require uucp functionality, you should remove the >uucp packages from your system. > >********************** The Programs *************** > >uux (1) - Remote command execution over UUCP > If you specify an alternative configuration, it will run as the user > that called it, and pass the same configuration to uuxqt. > >uuxqt (1) - UUCP execution daemon > Defaults to allowing rmail and uucp to be run, and nothing else, > unless the configuration it is invoked with allows it to run other > commands. > >uucp (1) - Unix to Unix copy > If you specify an alternate configuration, it will also run as the user > that called it. > > uuxqt checks the arguments for the programs it is asked to execute > and gets rid of what it thinks are the potentially dangerous ones. > However, it does not remove long arguments. > >******************** The Exploit ****************** > >uux 'uucp -I/tmp/vv.v /tmp/somefile /tmp/someotherfile' > >will execute uucp, but will not use the /tmp/vv.v configuration file. > >However, > >uux 'uucp --config=/tmp/vv.v /tmp/somefile /tmp/someotherfile' > >will use the supplied configuration, without dropping privileges. > >1) Make a configuration file that allows any command to be executed, and > allows files from anywhere to be copied to anywhere that is writable > by uid/gid uucp. ( /tmp/config.uucp ) >2) Make a command file with the command you want to be executed. > ( /tmp/commands.uucp ) >3) Do something like the following: > >$ THISHOST=`uuname -l` >$ WHEREYOUWANTIT=/var/spool/uucp/${THISHOST}/X./X.${THISHOST}X1337 >$ uux 'uucp --config=/tmp/config.uucp /tmp/commands.uucp '${WHEREYOUWANTIT} > >The commands in /tmp/commands.uucp file will be executed by uuxqt, with >the uid/gid of uucp. > >If you want to perform an exploit, and don't know what to put in the >files, you should read the documentation for uucp. > >(Proof of concept root exploit for OpenBSD was performed on the wargame >running OpenBSD 2.8 at damageinc.tv [ http://damageinc.tv ] ) > >-- zen-parse > >=========================================================================== > http://mp3.com/cosv = Because %49%74%27%73%20%67%6f%6f%64%2e > 'gone platinum' = Buy the CD that %74%6f%6f%6b%20%61%67%65%73 > = and %73%6f%75%6e%64%73%20%6f%6b >=========================================================================== > >------------------------------------------------------------------------- >The preceding information is confidential and may not be redistributed >without explicit permission. Legal action may be taken to enforce this. >If this message was posted by zen-parse@gmx.net to a public forum it may >be redistributed as long as these conditions remain attached. If you are >mum or dad, this probably doesn't apply to you. -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20010908153417.0286b4b8>