Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Linux kernel 0day - dynamite inside, don't burn your fingers
From: Jeff D <fixedored () gmail com>
Date: Fri, 14 Jul 2006 15:02:18 -0700

Joanna R. wrote:
Hello,

attached 0day kernel 2.6 local root exploit. This is a new genuine bug,  unpatched in 2.6.17.4 - don't get confused by 
prctl inside - it is only used to change process status.

The code exploits a root race in /proc

have a nice day.
---------------------------------
 All new Yahoo! Mail "The new Interface is stunning in its simplicity and ease of use." - PC Magazine
------------------------------------------------------------------------

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Works here, at first I got a seg fault .. then I read into it a little ..
me () my box:~$ id
uid=1000(me) gid=1000(me) groups=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),116(camera),1000(me)
me () my box:~$ ./h00lyshit ./somefile

preparing
trying to exploit ./somefile

sh-3.1# id
uid=0(root) gid=1000(me) groups=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),116(camera),1000(me)

sh-3.1# uname -a
Linux  2.6.16 #4 PREEMPT Fri May 26 12:16:11 PDT 2006 i686 GNU/Linux

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]