Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: [Full-disclosure] Linux kernel exploit
From: niklas|brueckenschlaeger <niklas () brueckenschlaeger de>
Date: Wed, 08 Dec 2010 18:30:51 +0100

Debian lenny:

  niklas () sandbox:~$ uname -a
  Linux sandbox 2.6.26-2-amd64 #1 SMP Thu Sep 16 15:56:38 UTC 2010
x86_64 GNU/Linux
  niklas () sandbox:~$ make full-nelson
  cc     full-nelson.c   -o full-nelson
  niklas () sandbox:~$ ./full-nelson
  [*] Resolving kernel addresses...
   [+] Resolved econet_ioctl to 0xffffffffa01d319b
   [+] Resolved econet_ops to 0xffffffffa01d41e0
  [*] Failed to resolve kernel symbols.


On Wed, 2010-12-08 at 00:44 +0300, Kai wrote:
Anyone tested this in sandbox yet?

00:37 linups:../expl/kernel > cat /etc/*release*
openSUSE 11.3 (i586)
VERSION = 11.3
00:37 linups:../expl/kernel > uname -r
2.6.34.4-0.1-desktop
00:37 linups:../expl/kernel > gcc _2.6.37.local.c -o test
00:37 linups:../expl/kernel > ./test
[*] Failed to open file descriptors.




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]