Exploit FreeBSD 3.3 - 'gdc' Symlink

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
19650
Проверка EDB
  1. Пройдено
Автор
BROCK TELLIER
Тип уязвимости
LOCAL
Платформа
FREEBSD
CVE
cve-1999-0857
Дата публикации
1999-12-01
FreeBSD 3.3 - 'gdc' Symlink
Код:
source: https://www.securityfocus.com/bid/835/info

It is possible to write debug ouput from gdc to a file (/var/tmp/gdb_dump). Unfortunately, gdc follows symbolic links which can be created in tmp and will overwrite any file on the system thanks to it being setiud root. This does not cause any immediate compromises and is more of a denial of service attack since it does not change the permissions of the overwritten files (to say, world writeable or group writeable). Local users are required to be in group wheel (or equivelent) to execute gdc.

ln -s /etc/master.passwd /var/tmp/gated_dump

And then wait for a priviliged user to run gdc dump.
 
Источник
www.exploit-db.com

Похожие темы