Bugtraq mailing list archives
problems in /usr/Cadmin/bin for IRIX 5.3: EXPLOIT
From: gkaufman () cs uct ac za (Grant Kaufmann)
Date: Tue, 6 Aug 1996 14:45:10 +0200
As promised, the exploit for chost under IRIX 5.3. If someone can verify any other versions of IRIX; 4.0.5F is not vulnerable. -------- /usr/Cadmin/bin/chost tools-primary user information change information OK (to root password, ie leave blank) OK (to "password invalid") Cancel Double-click any share resource to bring up desktopManager running as root. Try editing /etc/passwd -------- -- Grant -- http://www.cs.uct.ac.za/~gkaufman/pgp.html
Current thread:
- Exploiting Zolaris 2.4 ?? :) Aleph One (Aug 03)
- Re: Exploiting Zolaris 2.4 ?? :) Casper Dik (Aug 04)
- Re: Exploiting Zolaris 2.4 ?? :) David DeSimone (Aug 04)
- Re: Exploiting Zolaris 2.4 ?? :) Grant Kaufmann (Aug 05)
- Re: Exploiting Zolaris 2.4 ?? :) Casper Dik (Aug 06)
- problems in /usr/Cadmin/bin for IRIX 5.3 Grant Kaufmann (Aug 05)
- CERT Advisory CA-96.16 - Vulnerability in Solaris admintool CERT Advisory (Aug 05)
- Re: group-setuid core hole Justin Mason (Aug 06)
- problems in /usr/Cadmin/bin for IRIX 5.3: EXPLOIT Grant Kaufmann (Aug 06)
- CERT Advisory CA-96.17 - Vulnerability in Solaris vold CERT Advisory (Aug 06)
- Re: Exploiting Zolaris 2.4 ?? :) Casper Dik (Aug 04)