[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <44EB05BE.6050602@digitalmunition.com>
Date: Tue, 22 Aug 2006 09:25:18 -0400
From: "K F (lists)" <kf_lists@...italmunition.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: NETRAGARD-20060624 SECURITY ADVISORY] [ROXIO
TOAST 7 TITANIUM - LOCAL ROOT COMPROMISE ]
I am going to have to disagree... the admin users on OS X can NOT become
root at any time. The admin user must first know the admin password
before becoming root.
Simple example... I walk into your office and your mac is logged in as
admin. If I try to do any admin level tasks like add a user or install
software (into system folders) I must first authenticate. If I don't
know your password then sorry about my luck.
Based on the info below ANYONE that sits down at your pc while it is
logged in can take advantage of the fact that you can take root WITHOUT
a password using the technique outlined below.
Don't act like you have never let someone use a web browser or log into
instant messenger on your computer before...
Heck I may go down to the apple store and take root on one of the demo
machines that has 20 bajillion software apps instaled on it for me to
try before I buy. Chances are the machines are logged in as admin...
chances are they (folks at Apple store) feel safe because I don't know
the password.... chances are they are mistaken ... just like you.
-KF
Propaganda Support wrote:
> Hello list members,
>
> I don't consider this to be a legitimate exploit at all, since admin
> privileges are required to access the Deja Vu preference pane. (It's
> locked for standard users.) And, of course, any admin user on OS X can
> become root at any time:
>
> % sudo su
> Password:
> godard:/tmp root# id
> uid=0(root) gid=0(wheel) groups=0(wheel), 1(daemon), 2(kmem), 3(sys),
> 4(tty), 29(certusers), 8(procview), 5(operator), 9(procmod),
> 80(admin), 20(staff)
>
> The "attack" depends primarily on the ability to prepend /tmp to
> $PATH, as shown in this part of Step 2:
>
>> netragard-test-1$export PATH=/tmp/:$PATH
>
> Even if there is a malicious 'rm' program (for example) sitting inside
> of /tmp, the 'export' command can only change the $PATH environment
> variable to prepend /tmp within the current account (actually, only
> within the current shell session).
>
> In other words, if the "attacker" already has an admin user name and
> password required to use Deja Vu, then they already have the means to
> become root at any time (see 'sudo su' above).
>
> Kind Regards,
> -jeff
>
> --Jeff Holland
> http://propagandaprod.com
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Propaganda Support wrote:
> Hello list members,
>
> I don't consider this to be a legitimate exploit at all, since admin
> privileges are required to access the Deja Vu preference pane. (It's
> locked for standard users.) And, of course, any admin user on OS X can
> become root at any time:
>
> % sudo su
> Password:
> godard:/tmp root# id
> uid=0(root) gid=0(wheel) groups=0(wheel), 1(daemon), 2(kmem), 3(sys),
> 4(tty), 29(certusers), 8(procview), 5(operator), 9(procmod),
> 80(admin), 20(staff)
>
> The "attack" depends primarily on the ability to prepend /tmp to
> $PATH, as shown in this part of Step 2:
>
>> netragard-test-1$export PATH=/tmp/:$PATH
>
> Even if there is a malicious 'rm' program (for example) sitting inside
> of /tmp, the 'export' command can only change the $PATH environment
> variable to prepend /tmp within the current account (actually, only
> within the current shell session).
>
> In other words, if the "attacker" already has an admin user name and
> password required to use Deja Vu, then they already have the means to
> become root at any time (see 'sudo su' above).
>
> Kind Regards,
> -jeff
>
> --Jeff Holland
> http://propagandaprod.com
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists