lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <41E444B9.9050001@nbnet.nb.ca>
From: smenard at nbnet.nb.ca (steve menard)
Subject: Linux kernel uselib() privilege elevation,
	corrected

Gaz Wilson wrote:

>On Tue, 11 Jan 2005, Athanasius wrote:
>
>  
>
>>On Tue, Jan 11, 2005 at 07:56:32AM +0000, Marcy Darcy wrote:
>>    
>>
>>>I'm running a small server with the 2.6.10 kernel.
>>>
>>>The exploit doesen't seem to be working on this kernel. Is there a way
>>>to make sure the sistem is vulnerable or not?
>>>      
>>>
>>  I couldn't get the exploit to work for 2.6.10 either.  First there's
>>changing a struct in it to user_desc to make it compile, then it just
>>SEGVs all the time here.
>>    
>>
>
>I get it compiled and running on 2.6.8, but it doesn't do anything, other
>than hog all available CPU for about 10-15 minutes followed by:
>
>[-] FAILED: try again (-f switch) and again (Cannot allocate memory)
>Killed
>
>The same thing happens with the -f switch, except the process gets stopped
>(SIGSTOP) instead of killed after the alloted time.
>
>  
>
My RedHat 8.0  system won't give up id 0
although I do have a semi-permanent DOS on my hands right now with
./exploit -n5
;-)    since 4 hours ago   ;-{
I expect I just don't have thew commandline correct
Although it may [doubtful] be Bastille settings
steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ