---------- Forwarded message ----------
Date: Sat, 30 Sep 2000 14:15:16 -0600
From: Kurt Seifried <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: LSLID:2000093002 - glibc and userhelper - local root exploit

LSLID:2000093002

PROBLEM: local root thru setuid+glibc locale
FIX: don't let anyone else your computer.
WHAT??: advantage all other fixes to be suggested...
you get to use your computer more often than if you have to share it. ;}

FIX: no idea yet. mebe not allow .. in the locale for root or at all?

/* start of zen-nktb.c */
/***********************************************************
local root exploit - userhelper/kbdrate - console only
You can only use it on people you know.

               --zen-parse--

              ** programs **

[root@continuity /root]# rpm -qf /usr/bin/kbdrate
util-linux-2.9w-24
[root@continuity /root]# rpm -qf /usr/sbin/userhelper
usermode-1.35-1
[root@continuity /root]# rpm -qf /lib/libc.so.6
glibc-2.1.3-21

         ** short description **

people can get root if they are logged in to your machine,
actually at the console.

        ** longer description **

This exploits the glibc locale hole (even in fixed version).
(If your name is in /var/lock/console/* then you can do it.
Mebe other ways as well.)
Gets past the fix because there is a call to setuid(0);
just before exec-ing the called program. Now uid=euid=0
so it even gives u core dumps(owned by root).

              ** reason **

The sanity checks don't set done on the nonsuid programs.
Maybe sanity check root and all suids?

The exploit code is available at:
http://www.securityportal.com/research/exploits/linux/20000930-linux-locale.
txt


--------------------------------------------------------------------------
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3
Pengelola dapat dihubungi lewat [EMAIL PROTECTED]


Kirim email ke