[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Buffer overflow in sperl5.003 (fwd)
Hia,
It might be already known, but, what the heck, here goes for all of the
Perl users, who has suid sperl5.003 ...
--Ariel
P.S. chmod u-s /usr/sbin/sperl*
+---------------------------------------------------------+
| Ariel Biener |
| e-mail: ariel@post.tau.ac.il Work ph: 03-6406086 |
+---------------------------------------------------------+
---------- Forwarded message ----------
Date: Thu, 17 Apr 1997 14:11:09 -0700
From: Murphy <jtmurphy@CRAY1.ECST.CSUCHICO.EDU>
To: BUGTRAQ@NETSPACE.ORG
Subject: Buffer overflow in sperl5.003
Its came to my attention that there is a buffer overflow bug in
sperl5.003 that will allow local users gain root access, if SUID root.
The exploit and bug was made and brought to my attention by Willy Tarreau
(tarreau@aemiaif.ibp.fr).
Attached is the source for the exploit. Since it requires some work to
be done to the compiled exploit (Stripping of 5 byte at the begining and
end of the binary), the precompiled Linux x86 exploit can be found at
http://www.ecst.csuchico.edu/~jtmurphy/localusers.html.
PS. Have a nice a day.
--
----------------------------------------------------------------------------
Jason T. Murphy | Finger for PGP Public Key | jtmurphy@ecst.csuchico.edu
The Linux Security Home Page -> http://www.ecst.csuchico.edu/~jtmurphy
Security buff, Linux Freak, PC Tech @ Chico State, and all around nice guy.
sperlexp.tgz