Hi sebi! On Mon, 09 Jul 2001, sebi hegi wrote: > Hi! > After doing a check on my SuSE linux 7.0 x86 i found something interesting: > > hegi@faust:~ > ls -la /usr/sbin/dip > -rwsr-xr-- 1 root dialout 62056 Jul 29 2000 /usr/sbin/dip note the rights > > DIP: Dialup IP Protocol Driver version 3.3.7p-uri (25 Dec 96) > Written by Fred N. van Kempen, MicroWalt Corporation. > > I considered this as a sort of old version and did some searching and found > something on insecure.org as well as on securityfocus.com. > > Description: Standard overflow (in the -l option processing). > Author: Goran Gajic <ggajicat_private> > Compromise: root (local) > Vulnerable Systems: Slackware Linux 3.4, presumably any other system using dip-3.3.7o or earlier suid root. > Date: 5 May 1998 > > Referring to a bugtraq post from may 5. 1998 I did son research: > > root@faust:/home/hegi > gdb /usr/sbin/dip ^...... erm, you already have root here notice that 1st ls showed root.dialout, and the rest of the world has only read. so if you're not in the dialout group you cannot exec it. -- teodor
This archive was generated by hypermail 2b30 : Tue Jul 10 2001 - 07:16:59 PDT