vendor:
/usr/bin/trn
by:
ZzagorR
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: /usr/bin/trn
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Linux
2005
/usr/bin/trn local root exploit
This exploit targets the /usr/bin/trn binary and allows an attacker to gain root privileges. By providing a specially crafted 'buf' argument, the attacker can overwrite the return address and execute arbitrary code. The exploit includes a shellcode that spawns a root shell. This vulnerability affects versions of trn on Mandrake 9.2, Slackware 10.0.0, and Slackware 9.1.0.
Mitigation:
This vulnerability can be mitigated by applying the appropriate patch or update for the trn binary. Alternatively, users can remove the trn binary if it is not needed.