FW: Digital Unix 4.0x msgchk multiple vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



[Resend:  my original reply to Bugtraq on Monday 10th has not appeared, and
I haven't seen any other followup;  this time I've replaced all weird >
ASCII 127 characters in my screen dumps by X's in case that prevented my
email's handling by some MTA somewhere]

On 10 September 2001 03:54, SeungHyun Seo said :

> there were multiple vulnerabilities in "/usr/bin/mh/msgchk" on digital
> unix 4.0x. it's a mail utility - check for messages (only available within
the
> message handlin  system, mh)
[...]
> /usr/bin/mh/msgchk is affected to buffer overflow vulnerability
> 
>  -- snip --
>   $ /usr/bin/mh/msgchk `perl -e 'print "A"x9000'`
>   AAAAAAAAAAAAA ... ...
> AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA : 
>    msgchk: no such user as AAAAAAAAAAAAAAAAAAAAAA ... ...
> AAAAAAAAAAAAAAAAAAAAAAA
>   Memory fault(coredump)
>  -- snip --

NOT confirmed.  On my system (Digital Unix 4.0D, Patch Kit 5) this gives me
:

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ...
AAAAAAAAAAAAAA :
   msgchk: no such user as AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ...
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
followed by another command prompt.


And the exploit doesn't work :

/usr/users/joesoap/bin>cc msgbreak.c -o msgbreak -std
/usr/users/joesoap/bin>msgbreak
I'm going to create the standard MH path for you.
AAAAAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 .... [lots of pairs of "G" followed by "y" with an upsilon accent]
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
 .... [even more A's]
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA XX :
   msgchk: no such user as AAAAAXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
/usr/users/joesoap/bin>whoami
joesoap
/usr/users/joesoap/bin>uname -a
OSF1 mybox V4.0 878 alpha

(Lines wrapped for readability, and unprintable blobs replaced by X's.)

Looks like there must have been a patch for this somewhere in Patch Kits 1
thru 5.  
Or maybe the hole only exists *prior* to 4.0D.



Part 2:

>  Next , /usr/bin/mh/msgchk has a vulnerability that anyone read  1 line  
>  of the unprivileged file on the system it's a old bug on redhat linux
2.0,
>  but it also works on digital unix 4.0x

This hole doesn't work either :

/usr/users/joesoap>ln -sf /etc/passwd ./~mh_profile
/usr/users/joesoap>/usr/bin/mh/msgchk
joesoap :
   No file-source mail waiting; last read on Wed, 27 Sep 2000 17:48:21 BST

/usr/users/joesoap>head -2 ./~mh_profile
root:xxxxxxxxxxxxx:0:1:system PRIVILEGED account:/:/bin/csh
nobody:*Nologin:65534:65534:anonymous NFS user:/:


Nick Boyce
EDS, Bristol, UK

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux