[prev in list] [next in list] [prev in thread] [next in thread] 

List:       best-of-security
Subject:    linux yppasswd bug
From:       Julian Assange <proff () suburbia ! net>
Date:       1995-08-23 15:28:23
[Download RAW message or body]

Hi all,

here's the details on the hole in my yppasswdd. The bug was stupid and
simple; I forgot to check the user-supplied password for colons. This
allows people to submit a password update with a password like this:

:0:0:Big Boss:/:/tmp/foo
This will turn their password entry into something like this:

joe.user::0:0:Big Boss:/:/tmp/foo:Joe Random User:/home/joe:/bin/bash

All they now have to do is to copy their favorite shell to

/tmp/foo:Joe Random User:/home/joe:/bin/bash

Note that all of these are valid filename characters.


While fixing this, I noticed a second oversight, which may not be as bad,
but may cause problems nevertheless: Users were able to set passwords for
NIS entries like +janet or -joe if they were passwordless. Usually,
entries like these should not occur in the NIS server's password file,
and I do not believe they are acutally checked by any program. The
new version checks for them anyway.

Olaf
--
Olaf Kirch         |  --- o --- Nous sommes du soleil we love when we play
okir@monad.swb.de  |    / | \   sol.dhoop.naytheet.ah kin.ir.samse.qurax
             For my PGP public key, finger okir@brewhq.swb.

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic