I mangled the attached file, remove the 3 ### characters from each line
before uudecoding it.
If you unpack the included bad.tar.gz it overwrites /etc/passwd.
A tar ztvf of it reads:
tar ztvf bad.tar.gz
lrwxrwxrwx davids/davids 0 1999-10-26 20:46:50 foo -> /etc/passwd
-rw-r--r-- davids/davids 27 1999-10-26 20:47:46 foo
If this doesn't convince people not to use their system as root..
-------- Original Message --------
From: "David F. Skoll" <dfs at DOE.CARLETON.CA>
Subject: Re: Linux kernel source problem
To: BUGTRAQ at SECURITYFOCUS.COM
> If you want to damage your own system, untar the appended sample tar
> file as root (fortunately, GNU tar strips the leading "/" by default).
However, a little creative binary editing can spoof even GNU tar and
your system, to wit:
begin 644 bad.tar.gz
Please DO NOT unpack the above tar file as root! Just look at
the contents with the "t" option.
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!