what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

teso.atsadc.txt

teso.atsadc.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.

tags | root
systems | linux, redhat
SHA-256 | 506159ce20ba014e7a4a853444879fe6306bfc6bad43dc564b8b124ccdf79f23

teso.atsadc.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


- ------

TESO Security Advisory
09/03/2000

atsadc local root compromise


Summary
===================

The atsar application contains an exploitable vulnerability.

The Halloween 4 Linux distribution, which is based on RedHat 6.1 is
shipped with this suid-root program. It might be used to gain superuser
privileges.


Systems Affected
===================

Halloween 4 Linux distribution, maybe others too.
Any system that has atsar-linux-1.4.2 package installed.


Tests
===================

liane:[bletchley]> id -a
uid=501(bletchley) gid=501(bletchley) groups=501(bletchley)
liane:[bletchley]> uname -a
Linux liane.c-skills.de 2.2.13-13 #21 Thu Mar 2 10:36:13 WET 2000 i686 unknown
liane:[bletchley]> stat `which atsadc`
File: "/usr/sbin/atsadc"
Size: 16000 Filetype: Regular File
Mode: (4755/-rwsr-xr-x) Uid: ( 0/ root) Gid: ( 0/ root)
Device: 3,1 Inode: 117038 Links: 1
Access: Thu Mar 9 10:09:37 2000(00000.01:02:49)
Modify: Tue Nov 9 23:57:50 1999(00120.11:14:36)
Change: Tue Mar 7 14:55:23 2000(00001.20:17:03)
liane:[bletchley]> cd atsar-hack/
liane:[atsar-hack]> ./ass.pl
Creating hijack-lib ...
Compiling hijack-lib ...
Compile shell ...
Invoking vulnerable program (atsadc)...
sh: error in loading shared libraries:
sh: error in loading shared libraries:
Welcome. But as always: BEHAVE!
sh-2.03# id -a
uid=0(root) gid=0(root) groups=501(bletchley)
sh-2.03#


We've created a full working root-exploit which can be obtained from
[1] or [2].
To work properly the /etc/ld.so.preload file must not exist.
If it already exist, attackers may use other config-files to gain
root access.


Impact
===================

The vulnerable program 'atsadc' is shipped on the power-tools/contrib
CD and comes per default suid root (package "atsar-linux").
Attackers might use this program with obscure command-line-options to
gain locally root-access.


Explanation
===================

Atsadc doesn't properly check permissions of the output-file given
on the command-line. Rather it opens the file without the O_EXCL flag,
allowing an attacker to overwrite any file he wishes.
Due to the nice mode of 0664 an attacker may even create new files where
he has write-access too (group -rw).
In interaction with other linux 'system-tools' he can gain root-access.


Solution
===================

Remove the suid-bit.
The vendor and the author has been informed before, so a patch is already
available.


Acknowledgments
================

The bug-discovery, further analyzation and the exploit was done by

S. Krahmer -- https://www.cs.uni-potsdam.de/homepages/students/linuxer/

This advisory has been written S. Krahmer


Contact Information
===================

The TESO crew can be reached by mailing to tesopub@coredump.cx.
Our web-page is at https://teso.scene.at/

"C-Skills" developers may be reached through [1].


References
===================

[1] S. Krahmer, C-Skills
https://www.cs.uni-potsdam.de/homepages/students/linuxer/

[2] TESO
https://teso.scene.at


Disclaimer
===================

This advisory does not claim to be complete or to be usable for any
purpose. Especially information on the vulnerable systems may be
inaccurate or wrong. The supplied exploit is not to be used for malicious
purposes, but for educational purposes only.

This advisory is free for open distribution in unmodified form.
Articles that are based on information from this advisory should include
link [1] and [2].


Exploit
===================

We've created a working exploit to demonstrate the vulnerability.

The exploit is available on either

https://teso.scene.at/
or
https://www.cs.uni-potsdam.de/homepages/students/linuxer/


- ------

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.0 (GNU/Linux)
Comment: For info see https://www.gnupg.org

iD8DBQE4yQ3AcZZ+BjKdwjcRAiUIAJ0Y9ImuZ1tqcc/L9QL2z83PfAnZpwCeIEsP
jbEGQVclXZXC3espkFZzr0Y=
=2WIN
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close