Subject: [EXPL] Gauntlet Firewall exploit code has been released Date: Sat, 27 May 2000 12:30:26 +0200 Gauntlet Firewall exploit code has been released -------------------------------------------------------------------------------- SUMMARY As we reported in our previous article: < http://www.securiteam.com/securitynews/Gauntlet_Firewall_for_Unix_and_WebShield_CyberDaemon_buffer_overflow_vulnerability.html> Gauntlet Firewall for Unix and WebShield CyberDaemon buffer overflow vulnerability, a vulnerability in Gauntlet allows a remote attacker to cause the firewall to execute arbitrary code. An exploit code has now been released to test for this vulnerability. DETAILS The exploit code is written to run a test file called /bin/zz, so you need to create one in /bin on the Gauntlet firewall and chmod it to 700. Inside the zz file you should have it do something where it will leave you a log. Here is a real simple example: #!/bin/sh echo "IT RAN" > /tmp/TEST Exploit Code: /* * Animal.c * * * Remote Gauntlet BSDI proof of concept exploit. * Garrison technologies may have found it, but I am the * one who released it. ;) I do not have a Sparc or I would * write up the Solaris one too. If you have one, please * make the changes needed and post it. Thanks. * * Script kiddies can go away, this will only execute a file * named /bin/zz on the remote firewall. To test this code, * make a file named /bin/zz and chmod it to 700. * I suggest for the test you just have the zz file make a note * in syslog or whatever makes you happy. * * This code is intened for proof of concept only. * * * _Gramble_ * Hey BuBBles * *To use: * # Animal | nc
8999 */ #include