[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1152918306.5541.3.camel@numenor>
Date: Sat Jul 15 00:05:17 2006
From: irodriguez at ackstorm.es (IƱaki Rodriguez [ackstorm])
Subject: Linux kernel 0day - dynamite inside, don't
burn your fingers
El vie, 14-07-2006 a las 23:55 +0200, Dan B escribi?:
> Hello,
>
> Joanna R. wrote:
> > Hello,
> >
> > attached 0day kernel 2.6 local root exploit. This is a new genuine
> > bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it
> > is only used to change process status.
Tested on 2.6.17.4 - it works
> Tested on
>
> dan@...ox ~ $ uname -a
> Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9 16:44:22 CEST 2006 i686
> Intel(R) Pentium(R) M processor 2.00GHz GNU/Linux
>
> dan@...ox ~ $ ./h00lyshit ./Media/Audio/DnB/TheEngineer_060331.mp3
>
> preparing
> trying to exploit ./Media/Audio/DnB/TheEngineer_060331.mp3
>
> sh-3.1# id
> uid=0(root) gid=100(users) groups=7(lp),10(wheel),18(audio),27(video),35(games),81(apache),100(users),7353(svnusers)
> sh-3.1# whoami
> root
> sh-3.1#
>
>
> > The code exploits a root race in /proc
>
> So it does :)
> >
> > have a nice day.
>
> But this means that I've gotta worry about more servers now! Dam it!
>
> And is there a workaround to protect against this attack?
>
Mount /proc as nosuid.
>
> Cheers,
> Dan.
>
Greetings
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
--
---
I?aki Rodr?guez
irodriguez@...storm.es
Departamento de Sistemas
ACK STORM, S.L.
Dedicated Hosting services
http://ackstorm.es
Powered by blists - more mailing lists