The OpenNET Project / Index page
BSD, Linux, Cisco, Web, Palm, other unix
RUSSIAN version

Search
Выпущена CD-версия OpenNet.RU для оффлайн просмотра.
Для формирования заказа - перейдите по ссылке
.
SOFT - Unix Software catalog
LINKS - Unix resources
TOPIC - Articles from usenet
DOCUMENTATION - Unix guides
News | Tips | MAN | Forum | BUGs | LastSoft | Keywords | BOOKS (selected) | Linux HowTo | FAQ Archive

more info on the iosmash.c exploit


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 23 Apr 2002 20:23:43 +0000
From: John Scimone <jscimone@cc.gatech.edu>
To: bugtraq@securityfocus.com
Subject: more info on the iosmash.c exploit
Cc: vuln-dev@securityfocus.com, recon@snosoft.com

phased had some comments he wanted me to forward on to the lists in
regards to his latest exploit.

He says that skeys are used via all authentication methods... i.e telnet, so 
someone could change the user to someone in the wheel group.  Haven't used 
skeys via ssh yet but I presume it works.  Root obviously can't just telnet 
in by default but usually can ssh, but if the box being exploited contains 
people in the wheel group you can change the root user in the exploit to any 
user to log in via skeys as that user.

-sert-

That file you've been guarding, isn't.
-------------------------------------------------------------------
      ______________________________
     /   _____/\______   \__    ___/   | Secure Network Operations
     \_____  \  |       _/ |    |      | http://www.snosoft.com
     /        \ |    |   \ |    |      | recon@snosoft.com
    /_______  / |____|_  / |____|      |
            \/         \/              | Project Cerebrum
    Strategic  Reconnaissance Team     | cerebrum@snosoft.com

---------- Forwarded message ----------
Date: Wed, 24 Apr 2002 03:33:15 +0400
From: James Green <phased@mail.ru>
To: recon@snosoft.com
Subject: the iosmash.c exploit


in the comments i used su to gain root, someone needs to post to bugtraq
that skeys is used via all auth methods, i.e. telnet so you could change
the user to someone in wheel, havent used skeys via ssh but i presume it
 works. root isnt allowed to telnet default but usually can ssh, but if the
 box has people in the wheel group you can change the root to any user in the
 exploit to log in via skeys as that user.  btw dont forward this post can i
 had some beers tonight heh :) put it in better english lol

phased
phased@snosoft.com

-------------------------------------------------------

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Закладки
Добавить в закладки
Created 1996-2003 by Maxim Chirkov  
ДобавитьРекламаВебмастеруЦУПГИД  
SpyLOG TopList
RB2 Network.
RB2 Network.