I apologize if this has already been posted, I searched and did not find it. I found a buffer overflow (no exploit code here kiddies) in dbadmin v1.0.1 for linux. Dbadmin is a database administration tool that is run as a CGI to maintain mSQL servers. I am not sure whether it is exploitable or not. Here is the data: The README file indicates that the file needs to be setuid to the owner of mSQL server. It also suggests using a .htaccess file, so only priveledged users will be able to use this to any advantage. Looking at dbadmin.c, we see some interesting tidbits: dbadmin.c: strcpy(op_temp,curField->name); dbadmin.c: strcat(rec_new,curField->name); At a glance, that doesn't look very good. Neither does this: [root@ni dbadmin_v1.0.1]# grep strcat *.c | wc -l 63 [root@ni dbadmin_v1.0.1]# grep strcpy *.c | wc -l 13 This is code from 1996 so if there has probably been a newer release, but I can't seem to find it, or the author. Have a great day. Richard Zack. ------------------------------------------------------------ New Age Consulting Service, Inc. 216-619-2000 rootat_private richardat_private hostmasterat_private securityat_private http://www.nacs.net/~richard ------------------------------------------------------------
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:18:52 PDT