lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2129049273.1101491292275626197.JavaMail.root@plumbob.merit.edu>
Date: Mon, 13 Dec 2010 16:27:06 -0500 (EST)
From: Ryan Sears <rdsears@....edu>
To: dan j rosenberg <dan.j.rosenberg@...il.com>
Cc: leandro lista <leandro_lista@...tari.com.br>,
	firebits@...ktrack.com.br, bugtraq@...urityfocus.com,
	full-disclosure@...ts.grok.org.uk,
	"Cal Leeming [Simplicity Media Ltd]" <cal.leeming@...plicitymedialtd.co.uk>,
	full-disclosure-bounces@...ts.grok.org.uk,
	Ariel Biener <ariel@...t.tau.ac.il>
Subject: Re: [Full-disclosure] Linux kernel exploit

Hey Dan,

Freaking THANK YOU first and foremost. I've been waiting for someone to say that for days now, and was just about to myself. 

Just because everyone and their brother want's to show off that they can compile & run some software (herp a derp, good job) DOESN'T mean they should immediately post it here. I tested it against an OLDER KERNEL on purpose because I actually read the headers and the exploit worked as expected. I knew that this was responsibly disclosed, so it was already patched on any system that I updated. If you don't have the proper symbols, then the exploit doesn't have the proper offsets, and the exploit will fail. Plain and simple. *THEN* there's people who don't even bother to read that "Red Hat does not support Econet by default". DOES NOT. As in the exploit WON'T WORK!

It's pathetic that the original exploit dev has to waste his time saying the same thing 5 times.

</rant>

Ryan Sears

----- Original Message -----
From: "dan j rosenberg" <dan.j.rosenberg@...il.com>
To: "Cal Leeming [Simplicity Media Ltd]" <cal.leeming@...plicitymedialtd.co.uk>, full-disclosure-bounces@...ts.grok.org.uk, "Ariel Biener" <ariel@...t.tau.ac.il>
Cc: "leandro lista" <leandro_lista@...tari.com.br>, firebits@...ktrack.com.br, bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Sent: Monday, December 13, 2010 4:08:05 PM GMT -05:00 US/Canada Eastern
Subject: Re: [Full-disclosure] Linux kernel exploit

Please don't inundate me with e-mail because none of you bothered to read the exploit header.

The exploit so far has a 100% success rate on the systems it was designed to work on.

I don't think this is rocket science.  If your distribution does not compile Econet, then the exploit obviously won't be able to open an Econet socket.  This includes Arch Linux, Gentoo, Fedora, Red Hat, CentOS, Slackware, and more.  This doesn't mean you're not vulnerable, it just means this particular exploit won't work.

If your distro doesn't export the relevant symbols (Debian), ditto above.

If your distro has patched the Econet vulnerabilities I used to trigger this (Ubuntu), ditto above.

This was done on purpose, to avoid giving a weaponized exploit to people who shouldn't have one.

-Dan


Sent from my Verizon Wireless BlackBerry

-----Original Message-----
From: "Cal Leeming [Simplicity Media Ltd]"
	<cal.leeming@...plicitymedialtd.co.uk>
Sender: full-disclosure-bounces@...ts.grok.org.uk
Date: Mon, 13 Dec 2010 20:40:45 
To: Ariel Biener<ariel@...t.tau.ac.il>
Cc: <leandro_lista@...tari.com.br>; <firebits@...ktrack.com.br>; <bugtraq@...urityfocus.com>; <full-disclosure@...ts.grok.org.uk>
Subject: Re: [Full-disclosure] Linux kernel exploit

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ