|
Full Disclosure
mailing list archives
Re: Insect Pro - Advisory 2011 0428 - Zero Day - Heap Buffer Overflow in xMatters APClient
From: Valdis.Kletnieks () vt edu
Date: Thu, 28 Apr 2011 17:09:07 -0400
On Thu, 28 Apr 2011 14:40:22 -0300, Mario Vilas said:
Is the suid bit set on that binary? Otherwise, unless I'm missing something
it doesn't seem to be exploitable by an attacker...
Who cares? You got code executed on the remote box, that's the *hard* part.
Use that to inject a callback shell or something, use *that* to get yourself a shell
prompt. At that point, download something else that exploits you to root - if
you even *need* to, as quite often the Good Stuff is readable by non-root
users.
Attachment:
_bin
Description:
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
Re: Insect Pro - Advisory 2011 0428 - Zero Day - Heap Buffer Overflow in xMatters APClient Cal Leeming (Apr 29)
|