The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


xlock


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Mon, 29 Jun 1998 09:20:05 +0200
From: Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE.>
To: Thomas Gellekum <tg@ihf.rwth-aachen.de.>
Subject: Re: xlock
Cc: Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE.>,
 [email protected]

On Mon, Jun 29, 1998 at 08:58:02AM +0200, Thomas Gellekum wrote:
> Christoph Kukulies <kuku@gilberto.physik.RWTH-Aachen.DE.> writes:
> 
> > Alarmed by recent buffer overflow attacks on Linux machines in
> > my vicinity (an exploit for this is available) I thought about
> > xlock under FreeBSD and would like to know whether the
> > security hole has been sorted out under FreeBSD 2.2.x or what
> > measures are advised to prevent it.
> 
> Could you tell more about this?

 /* x86 XLOCK overflow exploit
      by [email protected] 4/17/97

      Original exploit framework - lpr exploit

      Usage: make xlock-exploit
             xlock-exploit  <optional_offset>

      Assumptions: xlock is suid root, and installed in /usr/X11/bin
  */

[complete xploit can be sent on demand]

xlock, since it is suid root (I don't know which version is affected
and if that is fixed maybe in XF86332) can be fed with a command line
parameter causing a buffer overflow which allows a logged in
normal user gaining a root shell. Actually the hole is a year old.

Since I didn't find xlock on freefall (hub) I thought the problem
is known already. The Linux exploit program doesn't work directly under
FreeBSD (causes a bad system call) but with some tweaking it
could be made to work.

SUSE Linux 5.x fixes it the following way:
1.) establishing a group 'shadow' in /etc/group, sole member 'root':

    shadow:x:15:root


2.) xlock becomes SGID group shadow:
   
-rwxr-sr-x   1 root     shadow     843596 Nov 16  1996 /usr/X11/bin/xlock*

3.) password files become group readable by group shadow

 -rw-r-----   1 root     shadow        289 Jan 16  1997 /etc/gshadow
 -rw-r-----   1 root     shadow        683 Jun 15 14:55 /etc/shadow
 -rw-r-----   1 root     shadow        683 May 14 18:09 /etc/shadow-
 -rw-r-----   1 root     shadow        642 Sep 30  1997 /etc/shadow.orig 


> 
> tg

-- 
--Chris Christoph P. U. Kukulies [email protected]

To Unsubscribe: send mail to [email protected]
with "unsubscribe security" in the body of the message


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру