Bug#4147: [daemon@ATHENA.MIT.EDU : [linux-security] Vulnerability in ALL linux distributions]
Package: mount
Version: 2.5j-1
I don't know if we have this problem currently, but I'd appreciate it
if you'd check.
------- Forwarded transaction
[8323] daemon@ATHENA.MIT.EDU (Theodore Y. Ts'o) Consulting_FYI 08/13/96 19:59 (73 lines)
Subject: [linux-security] Vulnerability in ALL linux distributions
Date: Tue, 13 Aug 1996 19:58:59 -0400
From: "Theodore Y. Ts'o" <tytso@MIT.EDU>
To: netusers@MIT.EDU
FYI.
------- Forwarded Message
Date: Tue, 13 Aug 1996 06:49:55 +0200
From: bloodmask <bloodmask@mymail.com>
Organization: CoViN
X-Mailer: Mozilla 3.0b5a (X11; I; Linux 2.0.0 i586)
Mime-Version: 1.0
To: linux-security@tarsier.cv.nrao.edu
Cc: linux-alert@tarsier.cv.nrao.edu
Subject: [linux-security] Vulnerability in ALL linux distributions
Content-Type: multipart/mixed; boundary="------------3E2982D84A560D2D9A831FA"
Sender: owner-linux-security@tarsier.cv.nrao.edu
Precedence: list
This is a multi-part message in MIME format.
--------------3E2982D84A560D2D9A831FA
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Greetings folks,
Sorry we haven't released this thing sooner, due to testing we've
conducted to determine vulnerability on other systems besides Linux,
I've attached the officail release, Patch this up quick, and if I were
you, I wouldn't trust those old binaries to be secure anymore, this
thing has been with Linux since it's beggining, at it's high time this
"feature" is removed.
--------------3E2982D84A560D2D9A831FA
Content-Type: text/plain; charset=us-ascii; name="cvnmount.exploit"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="cvnmount.exploit"
Covin Security Releases:
(mount bufferoverflow exploit v1.0)
Tested operated systems: All current distributions of Linux
Affect: Local users on systems affected can gain overflow mounts syntax
buffer and execute a shell by overwriting the stack.
Affected binaries:
(/bin/mount and /bin/umount)
Workaround:
On all current distributions of Linux remove suid bit of /bin/mount and
/bin/umount.
[chmod -s /bin/mount;chmod -s /bin/umount]
Remarks:
For gods sake, how many more times are we gonna see this kind of problem?
It's been with Linux since it's very beggining, and it's so easy to
exploit. Similiar buffer overflow vulnerabilities have been found in
Linux distributions many times before, splitvt, dip, just to name a few
examples.
Any remarks, notes or other forms of feedback may be redirected to:
bloodmask@mymail.com
[Mod: This exploit has already been posted to Bugtraq. --Jeff.]
--------------3E2982D84A560D2D9A831FA--
------- End Forwarded Message
--[8323]--
------- End forwarded transaction
Reply to: