lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <44EB05BE.6050602@digitalmunition.com>
Date: Tue, 22 Aug 2006 09:25:18 -0400
From: "K F (lists)" <kf_lists@...italmunition.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: NETRAGARD-20060624 SECURITY ADVISORY] [ROXIO
	TOAST	7 TITANIUM - LOCAL ROOT COMPROMISE ]

I am going to have to disagree... the admin users on OS X can NOT become 
root at any time. The admin user must first know the admin password 
before becoming root.

Simple example... I walk into your office and your mac is logged in as 
admin. If I try to do any admin level tasks like add a user or install 
software (into system folders) I must first authenticate.  If I don't 
know your password then sorry about my luck.

Based on the info below ANYONE that sits down at your pc while it is 
logged in can take advantage of the fact that you can take root WITHOUT 
a password using the technique outlined below.

Don't act like you have never let someone use a web browser or log into 
instant messenger on your computer before...

Heck I may go down to the apple store and take root on one of the demo 
machines that has 20 bajillion software apps instaled on it for me to 
try before I buy. Chances are the machines are logged in as admin... 
chances are they (folks at Apple store) feel safe because I don't know 
the password.... chances are they are mistaken ... just like you.

-KF

Propaganda Support wrote:
> Hello list members,
>
> I don't consider this to be a legitimate exploit at all, since admin 
> privileges are required to access the Deja Vu preference pane. (It's 
> locked for standard users.) And, of course, any admin user on OS X can 
> become root at any time:
>
> % sudo su
> Password:
> godard:/tmp root# id
> uid=0(root) gid=0(wheel) groups=0(wheel), 1(daemon), 2(kmem), 3(sys), 
> 4(tty), 29(certusers), 8(procview), 5(operator), 9(procmod), 
> 80(admin), 20(staff)
>
> The "attack" depends primarily on the ability to prepend /tmp to 
> $PATH, as shown in this part of Step 2:
>
>> netragard-test-1$export PATH=/tmp/:$PATH
>
> Even if there is a malicious 'rm' program (for example) sitting inside 
> of /tmp, the 'export' command can only change the $PATH environment 
> variable to prepend /tmp within the current account (actually, only 
> within the current shell session).
>
> In other words, if the "attacker" already has an admin user name and 
> password required to use Deja Vu, then they already have the means to 
> become root at any time (see 'sudo su' above).
>
> Kind Regards,
> -jeff
>
> --Jeff Holland
> http://propagandaprod.com
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



Propaganda Support wrote:
> Hello list members,
>
> I don't consider this to be a legitimate exploit at all, since admin 
> privileges are required to access the Deja Vu preference pane. (It's 
> locked for standard users.) And, of course, any admin user on OS X can 
> become root at any time:
>
> % sudo su
> Password:
> godard:/tmp root# id
> uid=0(root) gid=0(wheel) groups=0(wheel), 1(daemon), 2(kmem), 3(sys), 
> 4(tty), 29(certusers), 8(procview), 5(operator), 9(procmod), 
> 80(admin), 20(staff)
>
> The "attack" depends primarily on the ability to prepend /tmp to 
> $PATH, as shown in this part of Step 2:
>
>> netragard-test-1$export PATH=/tmp/:$PATH
>
> Even if there is a malicious 'rm' program (for example) sitting inside 
> of /tmp, the 'export' command can only change the $PATH environment 
> variable to prepend /tmp within the current account (actually, only 
> within the current shell session).
>
> In other words, if the "attacker" already has an admin user name and 
> password required to use Deja Vu, then they already have the means to 
> become root at any time (see 'sudo su' above).
>
> Kind Regards,
> -jeff
>
> --Jeff Holland
> http://propagandaprod.com
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ