local root on linux 2.2.15 (fwd)
Robert Watson
rwatson at FreeBSD.org
Thu Jun 8 11:44:14 GMT 2000
Robert N M Watson
robert at fledge.watson.org http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37 ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Safeport Network Services
---------- Forwarded message ----------
Date: Thu, 8 Jun 2000 00:38:14 +0200
From: Peter van Dijk <petervd at VUURWERK.NL>
To: BUGTRAQ at SECURITYFOCUS.COM
Subject: local root on linux 2.2.15
I do not have complete info right now, but here's the scoop:
Local users can gain root thru a _kernel_ bug in linux 2.2.15 and some
earlier versions. This is fixed in 2.2.16pre6. Linux 2.0.x is not
vulnerable, I do not know of any other vulnerable OSes.
The bug is that is it somehow possible to exec sendmail without the
CAP_SETUID priv, which makes the setuid() call that sendmail eventually
does to drop privs, fail. Big chunks of code that were never meant to run
as root then do run as root, which is ofcourse easily exploitable then.
This is just about all the info I have, I do not have the exploit but I
know that some black hats do have it. A couple of boxes already got
completely trashed after being rooted through this hole, which is why I am
making this public right now.
I did not discover this bug, I only extrapolated from the small info I had:
'it has to do with capsuid' 'sendmail is vulnerable, crond is not'. Some
reading of the kernel source then suggested the above to me, which has been
confirmed by a more knowledgeable source.
Greetz, Peter.
--
petervd at vuurwerk.nl - Peter van Dijk [student:developer:madly in love]
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 230 bytes
Desc:
Url : http://lists.freebsd.org/pipermail/posix1e/attachments/20000608/18219bcc/attachment.bin
More information about the posix1e
mailing list