DG/UX ospf_monitor vulnerability
Description: | It is suid and contains a command to write to file, which it does w/o dropping privileges. Brilliant. |
Author: | Brian Mitchell (brian@saturn.net) |
Compromise: | root (local) |
Vulnerable Systems: | Tested on DG/UX 5.4r3.10 |
Date: | 23 July 1996 |
Exploit:
From: Brian Mitchell (brian@saturn.net)
Date: Tue, 23 Jul 1996 19:03:07 -0400
There seems to be a vulnerbility in dg/ux (tested in 5.4r3.10) - it
includes ospf_monitor (from the gated package). Unfortunately, it is a
older version and has a security hole.
It is a suid program, and has a command to write to a file, so something
like this:
umask 0
ospf_monitor
F /tmp/foo
x
This should create a 0 byte world writable file called /tmp/foo, assuming
/tmp/foo does not exist. If it exists, it will be truncated, permissions
obviously will not be modified.
Brian Mitchell brian@saturn.net
"I never give them hell. I just tell the truth and they think it's hell"
- H. Truman
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: