On Mon, 2008-02-11 at 08:11 -0500, Ben Scott wrote: > On Feb 10, 2008 9:36 PM, Dan Miller <[EMAIL PROTECTED]> wrote: > > I wonder if 64 bit is immune. > > I don't understand the details of the code, but I see some > hard-coded values and a lot of assembler. Many exploits depend on > things like buffer sizes and offsets, so switching to a different word > size may mean the code would need to be tweaked. Or maybe vmsplice > has a completely different implementation on x86-64.
Interestingly I built and ran the code on my Ubuntu 7.10 system. As Bill stated I got a root terminal window. However, within a couple of minutes my system froze and I wasn't able to get it's attention again. Coincidentally the system announced that updates were available and it was within a few seconds of the update starting that the system went out to lunch. So I guess it's possible that the exploit trashes one or more system structures. Still, you could use the root window to elevate the privileges of an otherwise non-privileged account while the system was still runnable. -Alex > > -- Ben > _______________________________________________ > gnhlug-discuss mailing list > gnhlug-discuss@mail.gnhlug.org > http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/ _______________________________________________ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/