Bugtraq mailing list archives

asciiSECURE advisory (2002-07-17/1)


From: lumpy <lumpy () the whole net>
Date: Wed, 17 Jul 2002 13:31:10 -0400 (EDT)


____________________________________________________________________________
ASCII HEADER ADVISORY !! ALERT !! ASCII HEADER ADVISORY !! ALERT !! ASCII HE
:::::::: ADDIUNG A POORLY GENERATED ASCII HEADERZ FOR BUGTACKY READERZAAZSZ!
:::::apparentlytheonlywaytogetamessageacceptedonbugtraqistodothis:::::::::::
:::GREETZ2MOIher0z...mali/malificient/the mali amazing san fran treat:::::::
____________________________________________________________________________
Summary:  The BSDs, and even SUSE has been warned of this problem
        but for some reason they decided to ignore it, and act like it
        wasnt worth fixing.  Well, thats cool and all, unless you actually
        care about your system being able to do such basic features as:

                        + BACK UP DATA USING 'dump'
                        + USE SEVERAL MODEM BASED PROGRAMS USING 'tip'

        Any system user using 'flock()' can prevent the above features
        from working.
____________________________________________________________________________

Vulnerable OSes:
                        ALL RELEASED VERSIONS OF:

                        + OpenBSD (SEQUOORITY CONSCIENCESSOUS OPERATING
                                        SYSTEM THAT DISREGARDS LOCAL SECURITY!)
                        + FreeBSD
                        + NetBSD
                        + SUSE Linoocks

                        (All have been notified, and none have provided
                         suitable responses indicating fixes that will
                         be implemented.  If they have gotten around to
                         fixing it in the window between then and now,
                         shame on them for not contacting us back and
                         letting us know. We have a tight schedule at
                         WENDY'S, yo.  DAIRYFR33Z3 MANG)
____________________________________________________________________________
Creditz: Dead M1ke, the amazing wonder c0w, and Maynard the Public Works CSR
____________________________________________________________________________

Explanation:

                [SNIPPETS TO MAKE ME SOUND MORE BELIEVABLE!!$!$]
        ----------------------------------
        (void) flock(fileno(df), LOCK_SH);
        readdumptimes(df);
        (void) fclose(df);
        ----------------------------------

                        The application 'dump' is used by system
                administrators to backup filesystems.  If your system
                gets compromised, its generally nice to have backups,
                but ANY USER can stop dump from being able to run simply
                by flock()ing the /etc/dumpdates file.

                        It has been said before that flock security holes
                are 'unlikely' and 'easy to track down', but this was only
                said in reference to a small minded view of the method of
                attack.  A clever system penetrator would definitely be
                able to use this to their advantage, especially as a
                'nobody' user run out of a web server.  Thats just one
                simple example, but if youre creative you could think of
                more.

                        Perhaps you dont use dump, but you do use an
                application that uses 'tip' to communicate with a serial
                device.  Do you use it for notification?  I wouldnt on
                BSD or Linux and heres why.. if 'ACCULOG' is flocked
                (generally /var/log/acculog), it will freeze dead in its
                tracks too.

                        There are more instances of questionable uses of
                flock()ing, but since we cant even get these ones fixed,
                its hard to imagine they would be worth writing about.
____________________________________________________________________________

Exploit:

                If youre using freebsd, you simply use the /usr/bin/lockf
                command.  Other people can compile that.. grab it off of
                http://www.freebsd.org/.

                Thats all you need, and you can do really bad things on
                a system..

                HOWEVER -- it seems bugtraq is all about no name CGIs from
                russia that have poor perl mistakes and are exploitable on
                all of 3 servers in the world, so maybe you wont see this
                warning. SUCKS TO BE YOU I GUESS.
____________________________________________________________________________

PEACE
____________________________________________________________________________


Current thread: