lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jul 15 04:15:59 2006 From: jm3lee at gmail.com (Brian Jung Myeng Lee) Subject: Linux kernel 0day - dynamite inside, don't burn your fingers This doesn't work on Ubuntu 6.06 LTS. brian@...ntu:~/tmp$ uname -a Linux ubuntu 2.6.15-26-386 #1 PREEMPT Fri Jul 7 19:27:00 UTC 2006 i686 GNU/Linuxbrian@...ntu:~/tmp$ ./a.out /nfs/hd2/movies/Fight.Club.1999.avi preparing trying to exploit /nfs/hd2/movies/Fight.Club.1999.avi sh-3.1$ whoami brian On 7/14/06, I?aki Rodriguez [ackstorm] <irodriguez@...storm.es> wrote: > El vie, 14-07-2006 a las 23:55 +0200, Dan B escribi?: > > Hello, > > > > Joanna R. wrote: > > > Hello, > > > > > > attached 0day kernel 2.6 local root exploit. This is a new genuine > > > bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it > > > is only used to change process status. > > Tested on 2.6.17.4 - it works > > > Tested on > > > > dan@...ox ~ $ uname -a > > Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9 16:44:22 CEST 2006 i686 > > Intel(R) Pentium(R) M processor 2.00GHz GNU/Linux > > > > dan@...ox ~ $ ./h00lyshit ./Media/Audio/DnB/TheEngineer_060331.mp3 > > > > preparing > > trying to exploit ./Media/Audio/DnB/TheEngineer_060331.mp3 > > > > sh-3.1# id > > uid=0(root) gid=100(users) groups=7(lp),10(wheel),18(audio),27(video),35(games),81(apache),100(users),7353(svnusers) > > sh-3.1# whoami > > root > > sh-3.1# > > > > > > > The code exploits a root race in /proc > > > > So it does :) > > > > > > have a nice day. > > > > But this means that I've gotta worry about more servers now! Dam it! > > > > And is there a workaround to protect against this attack? > > > > Mount /proc as nosuid. > > > > > Cheers, > > Dan. > > > > Greetings > > > _______________________________________________ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > -- > --- > > I?aki Rodr?guez > irodriguez@...storm.es > Departamento de Sistemas > ACK STORM, S.L. > Dedicated Hosting services > http://ackstorm.es > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- Brian Jung Myeng Lee Homepage: http://koreanbrian.com
Powered by blists - more mailing lists