Following  is  based  on   TESO  Security  Advisory.   The   atsar
    application contains an exploitable vulnerability.  The  Halloween
    4 Linux  distribution, which  is based  on RedHat  6.1 is  shipped
    with this suid-root program.   It might be used to  gain superuser

    Affected are Halloween 4 Linux distribution, maybe others too; any
    system that has atsar-linux-1.4.2 package installed.


        liane:[bletchley]> id -a
        uid=501(bletchley) gid=501(bletchley) groups=501(bletchley)
        liane:[bletchley]> uname -a
        Linux 2.2.13-13 #21 Thu Mar 2 10:36:13 WET 2000 i686 unknown
        liane:[bletchley]> stat `which atsadc`
          File: "/usr/sbin/atsadc"
          Size: 16000        Filetype: Regular File
          Mode: (4755/-rwsr-xr-x)         Uid: (    0/    root)  Gid: (    0/    root)
        Device:  3,1   Inode: 117038    Links: 1
        Access: Thu Mar  9 10:09:37 2000(00000.01:02:49)
        Modify: Tue Nov  9 23:57:50 1999(00120.11:14:36)
        Change: Tue Mar  7 14:55:23 2000(00001.20:17:03)
        liane:[bletchley]> cd atsar-hack/
        liane:[atsar-hack]> ./
        Creating hijack-lib ...
        Compiling hijack-lib ...
        Compile shell ...
        Invoking vulnerable program (atsadc)...
        sh: error in loading shared libraries:
        sh: error in loading shared libraries:
        Welcome. But as always: BEHAVE!
        sh-2.03# id -a
        uid=0(root) gid=0(root) groups=501(bletchley)

    TESO created  a full  working root-exploit  which can  be obtained

    To work properly the /etc/  file must not exist.   If
    it already  exist, attackers  may use  other config-files  to gain
    root access.  As the vulnerable program 'atsadc' is shipped on the
    power-tools/contrib CD  and comes  per default  suid root (package
    "atsar-linux").   Attackers might  use this  program with  obscure
    command-line-options to gain locally root-access.

    Atsadc doesn't properly check permissions of the output-file given
    on the command-line.  Rather it opens the file without the  O_EXCL
    flag, allowing an attacker to  overwrite any file he wishes.   Due
    to the nice  mode of 0664  an attacker may  even create new  files
    where he has write-access too  (group -rw).   In  interaction with
    other linux 'system-tools' he can gain root-access.


    Remove the suid-bit.  The vendor and the author has been  informed
    before, so a patch is already available.