Lucene search

K
exploitpackMarco IvaldiEXPLOITPACK:1444BADB768BF82FC14EE9602074DD0C
HistoryApr 04, 2007 - 12:00 a.m.

TrueCrypt 4.3 - setuid Local Privilege Escalation

2007-04-0400:00:00
Marco Ivaldi
12

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

TrueCrypt 4.3 - setuid Local Privilege Escalation

# $Id: raptor_truecrypt,v 1.1.1.1 2007/04/04 11:31:56 raptor Exp $
#
# raptor_truecrypt - setuid truecrypt privilege escalation
# Copyright (c) 2007 Marco Ivaldi <[email protected]>
#
# TrueCrypt 4.3, when installed setuid root, allows local users to cause a 
# denial of service (filesystem unavailability) or gain privileges by mounting 
# a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another
# user's home directory, a different issue than CVE-2007-1589 (CVE-2007-1738).
#
# WARNING: THIS IS A PROOF OF CONCEPT EXPLOIT TAKING ADVANTAGE OF NPTL THREAD
# LOCAL STORAGE DYNAMIC LINKING MODEL, DO NOT USE IT IF YOU DON'T KNOW HOW IT
# WORKS! YEAH, IT *DOES* REQUIRE SOME TWEAKINGS TO EXPLOIT NON-TLS PLATFORMS!
#
# Other possible attack vectors: /etc/cron.{d,hourly,daily,weekly,monthly}, at 
# (/var/spool/atjobs/), xinetd (/etc/xinetd.d), /etc/logrotate.d, and more...

http://www.0xdeadbeef.info/exploits/raptor_truecrypt.tgz
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3664.tgz

# milw0rm.com [2007-04-04]

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

Related for EXPLOITPACK:1444BADB768BF82FC14EE9602074DD0C