DG/UX ospf_monitor vulnerability
|Description:||It is suid and contains a command to write to file, which it does w/o dropping privileges. Brilliant. |
|Author:||Brian Mitchell (firstname.lastname@example.org) |
|Compromise:|| root (local) |
|Vulnerable Systems:||Tested on DG/UX 5.4r3.10 |
|Date:||23 July 1996 |
From: Brian Mitchell (email@example.com)
Date: Tue, 23 Jul 1996 19:03:07 -0400
There seems to be a vulnerbility in dg/ux (tested in 5.4r3.10) - it
includes ospf_monitor (from the gated package). Unfortunately, it is a
older version and has a security hole.
It is a suid program, and has a command to write to a file, so something
This should create a 0 byte world writable file called /tmp/foo, assuming
/tmp/foo does not exist. If it exists, it will be truncated, permissions
obviously will not be modified.
Brian Mitchell firstname.lastname@example.org
"I never give them hell. I just tell the truth and they think it's hell"
- H. Truman
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: