Vulnerability Development mailing list archives
Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c)
From: drow () FALSE ORG (Daniel Jacobowitz)
Date: Sun, 4 Jun 2000 10:59:13 -0700
On Fri, Jun 02, 2000 at 07:53:58PM -0300, Paulo Ribeiro wrote:
/* * mail-slak.c (C) 2000 Paulo Ribeiro <prrar () nitnet com br> * * Exploit for /usr/bin/Mail. * Made specially for Slackware Linux 7.0. * Based on mailx.c by funkySh.
Well, it does generate a shell on Debian/woody, but Mail has already dropped priviledges: drow@quaketop:~% ./mail type '.' and enter: . Cc: too long to edit sh-2.04$ id uid=1000(drow) gid=1000(drow) groups=1000(drow) Same back to Debian/slink. Dan /--------------------------------\ /--------------------------------\ | Daniel Jacobowitz |__| SCS Class of 2002 | | Debian GNU/Linux Developer __ Carnegie Mellon University | | dan () debian org | | dmj+ () andrew cmu edu | \--------------------------------/ \--------------------------------/
Current thread:
- /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Paulo Ribeiro (Jun 02)
- Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Daniel Jacobowitz (Jun 04)
- Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Paulo Ribeiro (Jun 04)
- Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Daniel Jacobowitz (Jun 04)
- Mailx fix Daniel Jacobowitz (Jun 04)
- Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Janusz Niewiadomski (Jun 05)
- Re: /usr/bin/Mail exploit for Slackware 7.0 (mail-slack.c) Daniel Jacobowitz (Jun 04)