[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0408262146400.12968-100000@thehostedbox.com>
From: sec-focus at rpmdp.com (sec-focus@...dp.com)
Subject: !SPAM! Automated ssh scanning
On Thu, 26 Aug 2004, Richard Verwayen wrote:
> Then I updated this machine at least once a week with
> apt-get update && apt-get dist-upgrade
>
> You may want have a look at the installed packages in the list attached
I noticed from your installed list the kernel you have is:
kernel-source- 2.4.19-4.woody Linux kernel source for version 2.4.19
In the tools you posted about earlier, in xpl.tar.gz is the program "p4",
this is a compiled version of:
http://www.isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
I expect this is how the privilage escallation was done from guest to
root. I've seen this very thing used on another system. The kernel you
have on that woody machine is within the range of exploitable kernels.
Powered by blists - more mailing lists