exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

8lgm-04.txt

8lgm-04.txt
Posted Sep 23, 1999

8lgm-04.txt

SHA-256 | b39560bbffd58efa15aeb1ec2803e87d52d4be4c84e9e9325b6016476db701f8

8lgm-04.txt

Change Mirror Download

This advisory has been sent to:

comp.security.unix
INFOHAX <infohax-emergency@stormking.com>
BUGTRAQ <chasin@crimelab.com>
CERT/CC <cert@cert.org>
Gopher Maintainers <gopher@gopher.tc.umn.edu>

===========================================================================
[8lgm]-Advisory-4.UNIX.gopher.12-Feb-1992

PROGRAM:

gopher(1) (/usr/local/bin/gopher)
UMN gopher client

VULNERABLE OS's:

All versions are believed to have this vulnerability.

DESCRIPTION:

Shell access can be gained from gopher(1), even when running
in secure mode.

IMPACT:

gopher guest accounts are not secure.

REPEAT BY:

This example demonstrates how to use gopher running in secure
mode to gain access to sh. Please do not do this unless you
have permission.

Create or modify a .Links file on any public gopher server,
for example:

Type=8
Name=I'll give you a shell
Host=;/bin/sh
Port=
Path=

Log into the gopher account, and access the server and
directory containing the modified .Links file. Select the
"I'll give you a shell" item, and after quiting telnet the
user has access to sh.

It is also possible to create an entry that would not inform
the user of a gopher client of the commands that are about to
be executed. It is therefore possible to leave commands on a
gopher server for unsuspecting users to execute.

ADVICE:

1. Display techinical information about a link before
connecting to other hosts using gopher.

2. Consider disabling guest gopher logins in the interim.


FEEDBACK AND CONTACT INFORMATION:

8lgm-bugs@bagpuss.demon.co.uk (To report security flaws)

8lgm-request@bagpuss.demon.co.uk (Request for [8lgm] Advisories)

8lgm@bagpuss.demon.co.uk (General enquiries)


System Administrators are encouraged to contact us for any
other information they may require about the problems described
in this advisory.

We welcome reports about which platforms this flaw does or does
not exist on.

===========================================================================


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close