xrw bug
Description: | shelling from a xrw telnet session cedes EUID 0 |
Author: | Ess Jay |
Compromise: | root (local) |
Vulnerable Systems: | HP/UX with vulnerable xrw, probably 9.x 10.x |
Date: | 23 May 1996 |
Notes: | See the SOD HP Bug of the Week page |
Exploit:
Msg# 223 (HP) - 05/23/96 03:34
From: Ess Jay
To: All
Subject: hole in xrw
I don't know if the bug is in rwiDCOM or what, but SOMETHING definitely has a
bug... start up the xrw window, go to General menu, into DataComm, then
choose telnet to some valid host.. telnet will start up in the window, and
then use ^] to get to the telnet prompt and use !sh -i and you're euid root..
Boo!
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: