Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Oct 2000 16:59:08 -0700
From:      Steve Reid <sreid@sea-to-sky.net>
To:        Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: ncurses buffer overflows (fwd)
Message-ID:  <20001010165908.C9112@grok>
In-Reply-To: <200010101403.e9AE3Ir08713@cwsys.cwsent.com>; from Cy Schubert - ITSD Open Systems Group on Tue, Oct 10, 2000 at 07:02:30AM -0700
References:  <200010101403.e9AE3Ir08713@cwsys.cwsent.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Oct 10, 2000 at 07:02:30AM -0700, Cy Schubert - ITSD Open Systems Group wrote:
> For those of you who don't subscribe to BUGTRAQ, here's a heads up.

I tried it on a 4.1-R box and a 4.1.1-R box, with the same results both
times:

steve@grok:/home/steve% ./exploit.csh 
-rwxr-sr-x  1 steve  wheel  622908 Oct 10 16:47 /tmp/csh

So there is arbitrary code being executed to copy csh to /tmp and set
it setguid, but I am in group wheel already, so no gain (it should be
group kmem). Either systat gives up privs before the Bad Stuff happens,
or the exploit is just a proof-of-concept designed to not work for
script kiddies.

What about top? It is linked to ncurses too. I tried changing the
script to use top instead of systat but got this:

steve@grok:/home/steve% ./exploit.csh 
ls: /tmp/csh: No such file or directory

So either top is not exploitable or the exploit needs to be modified
for top.

I would `chmod g-s /usr/bin/systat /usr/bin/top` until we know for
sure.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001010165908.C9112>