The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


buffer overflow in dbadmin


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 7 Oct 1998 23:49:30 -0400
From: NACS Security Administrator <[email protected]>
To: [email protected]
Subject: buffer overflow in dbadmin

I apologize if this has already been posted, I searched and did not find
it.  I found a buffer overflow (no exploit code here kiddies) in
dbadmin v1.0.1 for linux.  Dbadmin is a database administration tool
that is run as a CGI to maintain mSQL servers.

I am not sure whether it is exploitable or not.  Here is the data:

The README file indicates that the file needs to be setuid to the
owner of mSQL server.  It also suggests using a .htaccess file, so only
priveledged users will be able to use this to any advantage.

Looking at dbadmin.c, we see some interesting tidbits:

dbadmin.c:    strcpy(op_temp,curField->name);
dbadmin.c:      strcat(rec_new,curField->name);

At a glance, that doesn't look very good.  Neither does this:

[root@ni dbadmin_v1.0.1]# grep strcat *.c | wc -l
     63
[root@ni dbadmin_v1.0.1]# grep strcpy *.c | wc -l
     13

This is code from 1996 so if there has probably been a newer release, but
I can't seem to find it, or the author.

Have a great day.

Richard Zack.
------------------------------------------------------------
New Age Consulting Service, Inc.        216-619-2000

[email protected]                           [email protected]
[email protected]                     [email protected]

http://www.nacs.net/~richard
------------------------------------------------------------

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру