Bugtraq mailing list archives

'/usr/bin/at 31337 + vuln' problem + exploit


From: zen-parse <zen-parse () gmx net>
Date: Thu, 17 Jan 2002 13:19:08 +1300 (NZDT)

Affects: /usr/bin/at 

To check if you are potentially vulnerable to this exploit, execute:
  /usr/bin/at 31337 + vuln

If you are vulnerable this will cause:
Segmentation fault 

If not, there will be a message similar to: 
Garbled time
(possibly with some extra information)

The problem is caused by a bug in the parser which deallocates the same 
memory location twice.

This can sometimes be exploited, for the uid of "daemon",  and due to some 
other minor problems, may allow root access from there.

Attached is an exploit for Redhat 7.0.

bash-2.04$ rpm -qf /lib/libc-*
glibc-2.2.4-18.7.0.3 
bash-2.04$ rpm -qf /usr/bin/at
at-3.1.8-12
bash-2.04$ tar -xzf attn.tar.gz
bash-2.04$ cd attn
bash-2.04$ id
uid=500(evil) gid=500(evil) groups=500(evil)
bash-2.04$ ./doit.sh
woot-2.04# id
uid=0(root) gid=0(root) groups=500(evil)
woot-2.04# echo "I was just testing something and you need to fix at or some malicious hacker could be evil." |mail -s 
"Fix /usr/bin/at" root
woot-2.04# exit
bash-2.04$ 

-- zen-parse

-------------------------------------------------------------------------
1) If this message was posted to a public forum by zen-parse () gmx net, it 
may be redistributed without modification. 
2) In any other case the contents of this message is confidential and not 
to be distributed in any form without express permission from the author.
This document may contain Unclassified Controlled Nuclear Information.


Attachment: attn.tar.gz
Description: Local root exploit (rh 7.0)


Current thread: