[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <43494568.402@thedarkside.nl>
Date: Sun Oct 9 18:40:24 2005
From: pieter at thedarkside.nl (Pieter de Boer)
Subject: Local suid files and buffer overflows
Werner Schalk wrote:
> Now I exploited it using Aleph One's shellcode (see
> http://shellcode.org/shellcode/linux/null-free/) but I won't get a SUID
> shell afterwards (I know the exploit did work but I still have my normal
> user privleges). Why? I have tried a different shellcode to write a file
> and this file was root:root. Any ideas, hints, rtfm?
Some shells (at least bash, that I know of) drop privileges when uid !=
euid. That's why I 'always' use zsh, which doesn't do that ;)
--
Pieter
Powered by blists - more mailing lists