lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat Jul 15 04:15:59 2006
From: jm3lee at gmail.com (Brian Jung Myeng Lee)
Subject: Linux kernel 0day - dynamite inside,
	don't burn your fingers

This doesn't work on Ubuntu 6.06 LTS.

brian@...ntu:~/tmp$ uname -a
Linux ubuntu 2.6.15-26-386 #1 PREEMPT Fri Jul 7 19:27:00 UTC 2006 i686
GNU/Linuxbrian@...ntu:~/tmp$ ./a.out
/nfs/hd2/movies/Fight.Club.1999.avi

preparing
trying to exploit /nfs/hd2/movies/Fight.Club.1999.avi

sh-3.1$ whoami
brian


On 7/14/06, I?aki Rodriguez [ackstorm] <irodriguez@...storm.es> wrote:
> El vie, 14-07-2006 a las 23:55 +0200, Dan B escribi?:
> > Hello,
> >
> > Joanna R. wrote:
> > > Hello,
> > >
> > > attached 0day kernel 2.6 local root exploit. This is a new genuine
> > > bug,  unpatched in 2.6.17.4 - don't get confused by prctl inside - it
> > > is only used to change process status.
>
> Tested on 2.6.17.4 - it works
>
> > Tested on
> >
> > dan@...ox ~ $ uname -a
> > Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9 16:44:22 CEST 2006 i686
> > Intel(R) Pentium(R) M processor 2.00GHz GNU/Linux
> >
> > dan@...ox ~ $ ./h00lyshit ./Media/Audio/DnB/TheEngineer_060331.mp3
> >
> > preparing
> > trying to exploit ./Media/Audio/DnB/TheEngineer_060331.mp3
> >
> > sh-3.1# id
> > uid=0(root) gid=100(users) groups=7(lp),10(wheel),18(audio),27(video),35(games),81(apache),100(users),7353(svnusers)
> > sh-3.1# whoami
> > root
> > sh-3.1#
> >
> >
> > > The code exploits a root race in /proc
> >
> > So it does :)
> > >
> > > have a nice day.
> >
> > But this means that I've gotta worry about more servers now! Dam it!
> >
> > And is there a workaround to protect against this attack?
> >
>
> Mount /proc as nosuid.
>
> >
> > Cheers,
> > Dan.
> >
>
> Greetings
>
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> --
> ---
>
> I?aki Rodr?guez
> irodriguez@...storm.es
> Departamento de Sistemas
> ACK STORM, S.L.
> Dedicated Hosting services
> http://ackstorm.es
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


-- 
Brian Jung Myeng Lee
Homepage: http://koreanbrian.com

Powered by blists - more mailing lists