What about this:
./elflbl
[+] SLAB cleanup
child 1 VMAs 87
[+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80
[+] vmalloc area 0xe040 - 0xd000
[-] FAILED: uselib (Exec format error)
this is on woody, with vulnerable kernel (2.4.28 with ow1 and vserver),
I
A.J. Loonstra a écrit :
I tried modifying the exploit not to use /dev/shm... but this is wat
happens:
(...)
It says it did exploit but it didn't...
I just modify it the same way (without /dev/shm tmpfs-mounted).
And it worked as expected (uid 0 and root access).
Perhaps you inadvertly entered the
I tried modifying the exploit not to use /dev/shm... but this is wat
happens:
~$ ./a.out
[+] SLAB cleanup
child 1 VMAs 287
[+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80
[+] vmalloc area 0xc500 - 0xc9d17000
Wait... |
[+] race won maps=6768
expanded VMA
On Tue, Jan 11, 2005 at 10:18:46AM +0100, A.J. Loonstra wrote:
I tried modifying the exploit not to use /dev/shm... but this is wat
happens:
~$ ./a.out
[+] SLAB cleanup
child 1 VMAs 287
[+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80
[+] vmalloc area 0xc500 -
A.J. Loonstra wrote:
I tried modifying the exploit not to use /dev/shm... but this is wat
happens:
~$ ./a.out
[+] SLAB cleanup
child 1 VMAs 287
[+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80
[+] vmalloc area 0xc500 - 0xc9d17000
Wait... |
[+] race won maps=6768
Robert Vangel wrote:
It says it did exploit but it didn't...
A.
Try doing something that would require root (eg.. mount something,
create a file in /, etc)
Yep I tried that but I don't have root permissions
[EMAIL PROTECTED]:~$ ./a.out
[+] SLAB cleanup
child 1 VMAs 9019
[+] moved stack
Hello list,
I'm running a Woody box here with a partial KDE install.
It seems like the security team messed up the dependencies of kdelibs3
when they built the recent security update for CAN-2004-1165:
$ sudo apt-get upgrade
Reading Package Lists...
Building Dependency Tree...
The following
Hi,
I've done some cursory apt-cache searching, and nothing's jumped out at
me...
Is there software in Debian that will do something along the lines of a tail
-f of a given logfile, looking for supplied regexs and do custom actions on
matches?
I want to tarpit excessive SSH login failures.
On Wednesday, 2005-01-12 at 16:57:41 +1100, Andrew Pollock wrote:
Is there software in Debian that will do something along the lines of a tail
-f of a given logfile, looking for supplied regexs and do custom actions on
matches?
I'm using swatch. But swatch can only limit the number of actions
9 matches
Mail list logo