Sunday, May 13, 2001, 10:07:34 PM, zenith napisa�(a):

> ========================================================
> Vulnerable systems: redhat 7.0 with man-1.5h1-10 (default
> package) and earlier.
> =========================================================

> Heap Based Overflow of man via -S option gives GID man.
> Due to a slight error in a length check, the -S option to
> man can cause a buffer overflow on the heap, allowing redirection of execution into 
>user supplied code.

> man -S `perl -e 'print ":" x 100'`

Confirmed:

$ man -S `perl -e 'print ":" x 100'` sometext
Segmentation fault

> Will cause a seg fault if you are vulnerable.

> It is possible to insert a pointer into a linked list that will allow
> overwriting of any value in memory that is followed by 4 null
> characters (a null pointer). one such memory location is the last
> entry on the GOT (global offset table). When another item is added to
> the linked list, the address of the data (a filename) is inserted over
> the last value, effectively redefining the function to the code
> represented by the filename.

> Putting shellcode in the filename allows execution of arbitrary code
> when the function referred to is called.

> Redhat have be contacted, and will be releasing an errata soon.

> GID man allows a race condition for root via
> /etc/cron.daily/makewhatis and /sbin/makwhatis

My 'man' executable comes from default installation of RH 7.0.

-- 
pozdrawiam

|      Sylwester Zar�bski      |
|   e-mail: [EMAIL PROTECTED]   |
|      ICQ uin: #45780888      |
|   Administrator TORNET.PL    |


Reply via email to