what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

su+pam.redhat.txt

su+pam.redhat.txt
Posted Aug 17, 1999

Red Hat PAM version of the 'su' utility allows any local user to easily brute force the superuser (root) password with fast scripted (automated) attacks, avoiding all logging via syslog too.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | c23abd14c9e2881dca4bfad7645174d90c764fbcf557a71897e7f5dda127b21f

su+pam.redhat.txt

Change Mirror Download
Date: Wed, 9 Jun 1999 14:07:27 -0700
From: Tani Hosokawa <unknown@RIVERSTYX.NET>
To: BUGTRAQ@netspace.org
Subject: vulnerability in su/PAM in redhat

I was talking to some guy on IRC (st2) and he asked me to mention to
bugtraq (because he's not on the list) that the PAMified su that comes
with redhat has a slight hole. When you try to su to root (for example) if
it's successful, immediately gives you a shell prompt. Otherwise, it
delays a full second, then logs an authentication failure to syslog. If
you hit break in that second, no error, plus you know that the password
was bad, so you can brute force root's password. I wrote a little
threaded Perl prog that tested it (with a 0.25 second delay before the
break) to attack my own password (with my password in the wordlist) and it
seemed to work just fine, even with my own password hundreds of words down
in the list, so it seems pretty predictable, as long as the server's under
very little load (else you get a delay no matter what, and it screws the
whole process by giving false negatives).

---
tani hosokawa
river styx internet

-------------------------------------------------------------------------

Date: Fri, 11 Jun 1999 11:43:59 -0700
From: Tani Hosokawa <unknown@RIVERSTYX.NET>
To: BUGTRAQ@netspace.org
Subject: Re: vulnerability in su/PAM in redhat

Well, I just checked it out on a fairly vanilla RH6.0 box, and it
exhibited the same behaviour. This is only a bug with PAM-enabled
machines, Slackware, etc. do not have this problem. Also, it exhibits
this behaviour with or without shadowed passwords (I pwunconv'd and tried
it just now, same thing happened). I think it's a problem with one of the
PAM modules.

On Fri, 11 Jun 1999, C.J. Oster wrote:

> Not if you have the latest shadow package installed. If you type in an
> incorrect password, you get an immediate 'Sorry.' This may be correct for
> earlier versions of the shadow suite, but I don't remember and I only have
> the newest one installed. Latest version is at
> ftp://ftp.ists.pwr.wroc.pl/pub/linux/shadow/
> >I was talking to some guy on IRC (st2) and he asked me to mention to
> >bugtraq (because he's not on the list) that the PAMified su that comes
> >with redhat has a slight hole. When you try to su to root (for example) if
> >it's successful, immediately gives you a shell prompt. Otherwise, it
> >delays a full second, then logs an authentication failure to syslog. If
> >you hit break in that second, no error, plus you know that the password
> >was bad, so you can brute force root's password. I wrote a little
> >threaded Perl prog that tested it (with a 0.25 second delay before the
> >break) to attack my own password (with my password in the wordlist) and it
> >seemed to work just fine, even with my own password hundreds of words down
> >in the list, so it seems pretty predictable, as long as the server's under
> >very little load (else you get a delay no matter what, and it screws the
> >whole process by giving false negatives).

---
tani hosokawa
river styx internet

-------------------------------------------------------------------------

Date: Fri, 11 Jun 1999 12:38:02 +0000
From: Javi Polo <javipolo@infomail.lacaixa.es>
To: BUGTRAQ@netspace.org
Subject: Re: vulnerability in su/PAM in redhat

On Wed, 9 Jun 1999, Tani Hosokawa wrote:

> with redhat has a slight hole. When you try to su to root (for example) if
> it's successful, immediately gives you a shell prompt. Otherwise, it
> delays a full second, then logs an authentication failure to syslog. If
> you hit break in that second, no error, plus you know that the password
> was bad, so you can brute force root's password. I wrote a little

Checked ....
Confirmed for su that comes with
sh-utils-1.16-14
and using
pam-0.64-3

Ta luegos ...... Oh my God! They killed Kenny!!!!!!
Javi Polo ;)
Me puedes encontrar en fido en 2:347/13.4 yo tambiƩn 3000ya.com
AUTOPISTA NO!!!!!!!!!!! No a l'autopista de llevant

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close