💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › UNIX › linux_mo.asc captured on 2022-07-17 at 01:58:47.
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
Vulnrability in all known Linux distributions bloodmask (bloodmask@mymail.com) Tue, 13 Aug 1996 07:04:25 +0200 Greetings, Well folks, After all the other security issues in Linux, I can't say I'm really that shocked about this one, anyway, read the officail covin release. After finding this one, we at covin decided it's time to put and end to this issue, and we've begun scanning all of Linux's suid binaries for other hints of these hidden "features", Results will be released soon. The reason we are also releasing the exploit, an act which may seem highly inresponsable, is due to previous expieriance that making the exploit widely available, ussually speeds up the proccess of patching up stupid vulnerabilities like these. BTW, This is kind of out of topic, but I figure, there's nothing wrong with killing two birds with one stone... Ijust noticed when installing the latest version of the shadow suite, taken from sunsite, that it "unpatched" the lib enviorment vulnerability on my system. I haven't had the time to determine *HOW* it exposed my system, but it would be wise to check up on this matter. --------------2F3F790C537451604439D8BF Content-Type: text/plain; charset=us-ascii; name="cvnmount.exploit" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="cvnmount.exploit" Covin Security Releases: (mount bufferoverflow exploit v1.0) Tested operated systems: All current distributions of Linux Affect: Local users on systems affected can gain overflow mounts syntax buffer and execute a shell by overwriting the stack. Affected binaries: (/bin/mount and /bin/umount) Workaround: On all current distributions of Linux remove suid bit of /bin/mount and /bin/umount. [chmod -s /bin/mount;chmod -s /bin/umount] Remarks: For gods sake, how many more times are we gonna see this kind of problem? It's been with Linux since it's very beggining, and it's so easy to exploit. Similiar buffer overflow vulnerabilities have been found in Linux distributions many times before, splitvt, dip, just to name a few examples. Any remarks, notes or other forms of feedback may be redirected to: bloodmask@mymail.com <------------------------------[ Cut here ]----------------------------------> /* Mount Exploit for Linux, Jul 30 1996 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: ::::::::""`````""::::::""`````""::"```":::'"```'.g$S