Midikeys Vulnerability
The setuid root 'midikeys' executable can be used to edit arbitrary files via its graphical user interface, granting malicious users root access to the system. Running the midikeys application, clicking in sounds, and then songs will bring up a file dialog. By entering a filename of a known file it will be opened for editing with root privileges. People have reported trouble reproducting the vulnerability when the editor is vi. Alternatively, the WINEDITOR environment variable can be changed to be any command executed as root. Under Irix 6.2, this can be done by going to Toolchest -> Desktop -> Customize -> Desktop -> Default Editor: Other, or under Irix 6.5 in Toolchest -> Desktop -> Customize -> Utilities -> Test Editor: Other. The midikeys window can be opened by running 'midikeys -display remotehost:0'. Under the midikeys window, clicking sounds and then midi songs will open a file manager type interface. The path and filename of files can be entered, including root owned with group/world read/write permissions unset. If a file like '/usr/share/data/music/README' is selected, it will appear in a text editor. The text editor can be used to open /etc/passwd and make modifications at will.