mailing list archives
Local suid files and buffer overflows
From: "Werner Schalk" <werner_schalk () gmx de>
Date: Sun, 9 Oct 2005 01:17:39 +0200 (MEST)
first of all apologies for asking such a newbie question but I am trying
to learn how to exploit buffer overflows and therefore wrote a little
program to exploit. This little program has the following permissions:
$ ls -la test1
-rwsr-sr-x 1 root root 17164 Oct 8 01:25 test1
Now I exploited it using Aleph One's shellcode (see
http://shellcode.org/shellcode/linux/null-free/) but I won't get a SUID
shell afterwards (I know the exploit did work but I still have my normal
user privleges). Why? I have tried a different shellcode to write a file
and this file was root:root. Any ideas, hints, rtfm?
Lust, ein paar Euro nebenbei zu verdienen? Ohne Kosten, ohne Risiko!
Satte Provisionen für GMX Partner: http://www.gmx.net/de/go/partner
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Local suid files and buffer overflows Werner Schalk (Oct 09)