Date: Wed, 7 Oct 1998 23:49:30 -0400
From: NACS Security Administrator <[email protected]>
To: [email protected]Subject: buffer overflow in dbadmin
I apologize if this has already been posted, I searched and did not find
it. I found a buffer overflow (no exploit code here kiddies) in
dbadmin v1.0.1 for linux. Dbadmin is a database administration tool
that is run as a CGI to maintain mSQL servers.
I am not sure whether it is exploitable or not. Here is the data:
The README file indicates that the file needs to be setuid to the
owner of mSQL server. It also suggests using a .htaccess file, so only
priveledged users will be able to use this to any advantage.
Looking at dbadmin.c, we see some interesting tidbits:
dbadmin.c: strcpy(op_temp,curField->name);
dbadmin.c: strcat(rec_new,curField->name);
At a glance, that doesn't look very good. Neither does this:
[root@ni dbadmin_v1.0.1]# grep strcat *.c | wc -l
63
[root@ni dbadmin_v1.0.1]# grep strcpy *.c | wc -l
13
This is code from 1996 so if there has probably been a newer release, but
I can't seem to find it, or the author.
Have a great day.
Richard Zack.
------------------------------------------------------------
New Age Consulting Service, Inc. 216-619-2000
[email protected][email protected][email protected][email protected]http://www.nacs.net/~richard
------------------------------------------------------------