Re: local root exploit

2005-01-11 Thread Dariush Pietrzak
What about this: ./elflbl [+] SLAB cleanup child 1 VMAs 87 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xe040 - 0xd000 [-] FAILED: uselib (Exec format error) this is on woody, with vulnerable kernel (2.4.28 with ow1 and vserver), I

Re: local root exploit

2005-01-11 Thread Christophe Chisogne
A.J. Loonstra a écrit : I tried modifying the exploit not to use /dev/shm... but this is wat happens: (...) It says it did exploit but it didn't... I just modify it the same way (without /dev/shm tmpfs-mounted). And it worked as expected (uid 0 and root access). Perhaps you inadvertly entered the

Re: local root exploit

2005-01-11 Thread A.J. Loonstra
I tried modifying the exploit not to use /dev/shm... but this is wat happens: ~$ ./a.out [+] SLAB cleanup child 1 VMAs 287 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc500 - 0xc9d17000 Wait... | [+] race won maps=6768 expanded VMA

Re: local root exploit

2005-01-11 Thread Brett Parker
On Tue, Jan 11, 2005 at 10:18:46AM +0100, A.J. Loonstra wrote: I tried modifying the exploit not to use /dev/shm... but this is wat happens: ~$ ./a.out [+] SLAB cleanup child 1 VMAs 287 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc500 -

Re: local root exploit

2005-01-11 Thread Robert Vangel
A.J. Loonstra wrote: I tried modifying the exploit not to use /dev/shm... but this is wat happens: ~$ ./a.out [+] SLAB cleanup child 1 VMAs 287 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc500 - 0xc9d17000 Wait... | [+] race won maps=6768

Re: local root exploit

2005-01-11 Thread A.J. Loonstra
Robert Vangel wrote: It says it did exploit but it didn't... A. Try doing something that would require root (eg.. mount something, create a file in /, etc) Yep I tried that but I don't have root permissions [EMAIL PROTECTED]:~$ ./a.out [+] SLAB cleanup child 1 VMAs 9019 [+] moved stack

kdelibs3 security update with new dependencies?!

2005-01-11 Thread Nikolaus Schulz
Hello list, I'm running a Woody box here with a partial KDE install. It seems like the security team messed up the dependencies of kdelibs3 when they built the recent security update for CAN-2004-1165: $ sudo apt-get upgrade Reading Package Lists... Building Dependency Tree... The following

Log file IDS package?

2005-01-11 Thread Andrew Pollock
Hi, I've done some cursory apt-cache searching, and nothing's jumped out at me... Is there software in Debian that will do something along the lines of a tail -f of a given logfile, looking for supplied regexs and do custom actions on matches? I want to tarpit excessive SSH login failures.

Re: Log file IDS package?

2005-01-11 Thread Lupe Christoph
On Wednesday, 2005-01-12 at 16:57:41 +1100, Andrew Pollock wrote: Is there software in Debian that will do something along the lines of a tail -f of a given logfile, looking for supplied regexs and do custom actions on matches? I'm using swatch. But swatch can only limit the number of actions