Synchronet v3.19b-Win32 (install) has been released (Jan-2022).

You can donate to the Synchronet project using PayPal.

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
history:hack93 [2014/12/27 03:01] – [Synchronet/DSZ Hack of 1993] digital manhistory:hack93 [2016/02/29 18:34] – [The Admission] Grammar deuce
Line 5: Line 5:
 ===== The Vulnerability ===== ===== The Vulnerability =====
  
-A dubious and not-very-well documented feature of [[http://omen.com|DSZ]] allows the sender of a file to specify a path prefix to be be prepended onto the filename being stored on the receiving system thus allowing the sender to create or overwrite files outside of the intended destination directory (the intended destination directory is usually an upload or temporary directory not containing any sensitive system files). Adding a simple "re" (or "restrict") command-line option disables the PREFIX feature and eliminated the vulnerability. In hindsight, it really had nothing to do with Synchronet other than Synchronet had a dependency on external file transfer protocol drivers and this particular one (DSZ) had a significant security weakness in its default configuration.+A dubious and not-very-well documented feature of [[http://omen.com|DSZ]] (a popular file transfer program for BBSes of the time) allows the sender of a file to specify a path prefix to be be prepended onto the filename being stored on the receiving system thus allowing the sender to create or overwrite files outside of the intended destination directory (the intended destination directory is usually an upload or temporary directory not containing any sensitive system files). Adding a simple "re" (or "restrict") command-line option disables the "PREFIXfeature and eliminated the vulnerability. In hindsight, it really had nothing to do with Synchronet other than Synchronet had a dependency on external file transfer protocol drivers and this particular one (DSZ) had a significant security weakness in its default configuration.
  
 To be fair, the DSZ documentation (DSZ.DOC) does contain these notes about the ''restrict'' option: To be fair, the DSZ documentation (DSZ.DOC) does contain these notes about the ''restrict'' option:
Line 89: Line 89:
 </code> </code>
  
-I was weary of running any executuables uploaded by an admitted "hacker", but out of curiosity I decided to run them on a completely isolated system. Upon running the ''RUNME.COM'' program, it displayed the following short blurb:+I was wary of running any executuables uploaded by an admitted "hacker", but out of curiosity I decided to run them on a completely isolated system. Upon running the ''RUNME.COM'' program, it displayed the following short blurb:
  
 <code> <code>
Line 322: Line 322:
  
 ===== See Also ===== ===== See Also =====
 +  * [[https://www.youtube.com/watch?v=XLmxJ8oleZI|Video of hacker's confession with transcription and explanation of audio restoration performed by Deuce]]
   * [[:person:King Drafus]]   * [[:person:King Drafus]]
   * [[http://omen.com|Omen Technology (maker of DSZ and inventor of ZMODEM)]]   * [[http://omen.com|Omen Technology (maker of DSZ and inventor of ZMODEM)]]
Line 327: Line 328:
  
 {{tag>}} {{tag>}}
-