[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030126081334.17094.qmail@web10411.mail.yahoo.com>
From: woot_woot_root at yahoo.co.uk (Faulty)
Subject: format strings vulns in /bin/login and /usr/bin/passwd
Hello while doing a scan for format strings vulns on util-linux package it came back with the following results.
./login.c:398 FUNC fprintf
./login.c:425 FUNC fprintf
./login.c:597 FUNC fprintf
./login.c:614 FUNC fprintf
./login.c:775 FUNC printf
./login.c:796 FUNC fprintf
./login.c:800 FUNC fprintf
./login.c:1109 FUNC syslog
./login.c:1119 FUNC printf
./login.c:1127 FUNC fprintf
./login.c:1183 FUNC fprintf
./login.c:1190 FUNC fprintf
./login.c:1201 FUNC fprintf
./passwd.c:161 FUNC printf
./passwd.c:174 FUNC printf
./passwd.c:175 FUNC printf
./passwd.c:176 FUNC printf
./passwd.c:181 FUNC printf
./passwd.c:186 FUNC printf
./passwd.c:197 FUNC printf
./passwd.c:204 FUNC printf
./passwd.c:222 FUNC printf
./passwd.c:223 FUNC printf
./passwd.c:277 FUNC fprintf
./passwd.c:316 FUNC printf
./passwd.c:323 FUNC printf
./passwd.c:331 FUNC printf
./passwd.c:401 FUNC syslog
./passwd.c:410 FUNC printf
./passwd.c:414 FUNC printf
./passwd.c:420 FUNC printf
There is also a few other on other programs but i thought these 2 would be most important since passwd is suid and login could be exploited remotly. I am not very experianced in format strings any help/commets would be great. Would these be able to get exploited?
Regards
Faulty@....net
www.b0f.net
---------------------------------
With Yahoo! Mail you can get a bigger mailbox -- choose a size that fits your needs
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030126/8ffa2dba/attachment.html
Powered by blists - more mailing lists