what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

2003.001.txt

2003.001.txt
Posted Jan 27, 2003
Authored by inkubus | Site usg.org.uk

The utility slocate has a local buffer overflow vulnerability when the -r and -c switches are used. Due to this utility being setgid slocate on many default installs, slight privilege escalation is possible.

tags | advisory, overflow, local
SHA-256 | 7e71b25301d29a85ee989e3de872b234d94b33bc2d114ac572bfc141bb2eab8c

2003.001.txt

Change Mirror Download
__________________________________________________ 

USG Security Advisory
http://www.usg.org.uk/advisories/2003.001.txt
inkubus@hushmail.com
USG- SA- 2003.001 24- Jan- 2003
__________________________________________________

Package: slocate
Vulnerability: local buffer overflow
Type: local
Risk: high, users can gain high privileges in the system.
System tested: RedHat Linux 7.3 (Valhalla) with slocate-2.6-1 from RPM
Credits: Knight420, Team TESO, Michal Zalewski, Aleph1, dvdman

Description:
Accordingly to research done by USG team members and Knight420 who informed us
about this vulnerability a week earlier, there is a local buffer overflow in th
e slocate package
shipped with the most newer RedHat distributions, we have tested the vulnerabil
ity only in RedHat
Linux 7.2 and 7.3 but we think that other Linux/*nix systems that provide sloca
te package may be
vulnerable too.
The overflow appears when the slocate is runned with two parameters: -c and -r
, using as arguments a
1024 (or 10240, as Knight420 has informed us earlier) bytes string.
[inkubus@USG audit]$ rpm -qf /usr/bin/slocate && ls -al /usr/bin/slocate
slocate-2.6-1
-rwxr-sr-x 1 root slocate 25020 Jun 25 2001 /usr/bin/slocate
[inkubus@USG audit]$ /usr/bin/slocate -c `perl -e "print 'A' x 1024"` -r `perl
-e "print 'A' x 1024"`
Segmentation fault
[inkubus@USG audit]$ gdb /usr/bin/slocate
GNU gdb Red Hat Linux (5.1.90CVS-5)
Copyright 2002 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-redhat-linux"...(no debugging symbols found)..
.
(gdb) r -c `perl -e "print 'A' x 1024"` -r `perl -e "print 'A' x 1024"`
Starting program: /usr/bin/slocate -c `perl -e "print 'A' x 1024"` -r `perl -e
"print 'A' x 1024"`
warning: slocate: could not open database: /var/lib/slocate/slocate.db: Permiss
ion denied
warning: You need to run the 'updatedb' command (as root) to create the databas
e.
warning: slocate: decode_db(): ÐßBÐßBØßBØßBàßBàßBèßBèßBðßBðßBøßBøßB: No such fi
le or directory
warning: You need to run the 'updatedb' command (as root) to create the databas
e.
(no debugging symbols found)...(no debugging symbols found)...(no debugging sym
bols found)...
Program received signal SIGSEGV, Segmentation fault.
0x42080b1b in strlen () from /lib/i686/libc.so.6
(gdb)

The exploitation is trivial, we have coded already a POC exploit that will be p
ublished to the bugtraq
next days.
The author has been notified via: klindsay@mkintraweb.com

-------------------------------------------------------------------
inkubus@hushmail.com
Resistance is futile, you will be assimilated.
-------------------------------------------------------------------
EOF



Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close