Full Disclosure mailing list archives

Re: surfboard1.1.6 local exploit.


From: Meredydd <meredydd () everybuddy com>
Date: Thu, 13 May 2004 12:47:25 +0100

I'm...mildly impressed. Someone's still *using* that thing? Not that 
things have changed in this regard, but the latest version is 1.1.9, 
anyway.

Serious question, actually - they shouldn't exist, I know (believe me, I 
don't still code like that...), but exactly how severe is a hole such 
as this, which is only exploitable by the user who is running the 
daemon in the first place? Unless you're doing something like running 
the daemon as root, with a user-modifiable config file (at which point 
you have much more serious problems, like CGI), this doesn't actually 
escalate someone's privilege at all.

On Tuesday 11 May 2004 21:19, Anonymous wrote:
Solution:

fluffy has written a great cmd line hack to solve the problem:

for i in `locate surfboard`; do rm -rf $i ; done

Should do the trick ;)
Unfortunately, fluffy has neglected the file actually 
responsible, /usr/local/bin/surfd. Sorry to break it to him/her/it :^)

fluffy also forgot the next line, which goes something along the lines 
of:
apt-get install apache

Seriously. You shouldn't be using this lump of junk. Anyway, you 
*definitely* shouldn't be using 1.1.6, cause there's a good couple of 
arbitrary-traversal holes in there, along with tons of bugs (something 
you'd know if you read the archives of this list). 1.1.9 was the latest 
at time of announcement, and v1.1.10 is now on the sourceforge site, 
for any fool who's still using it...

Meredydd

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: