exploit-db-mirror/platforms/linux/local/19073
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

6 lines
No EOL
385 B
Text
Executable file

source: http://www.securityfocus.com/bid/81/info
netconfig creates the file /tmp/tmpmsg insecurely and follows symbolic links. An attacker can create a symbolic link from /tmp/tmpmsg to any file and wait for root to run the program. This will clober the target file. The file created has permissions -rw-r--r--.
$ ln -s /tmp/tmpmsg /etc/passwd
< wait for root to run netconfig >