Jon wrote:

[...]


Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]>


=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..........
=> Child process started..........

[...]

Does this mean the patch I downloaded worked?


Yes.

- Jon

Mmh, well, I have a non-patched 2.4.19 and so there should be the bug.
I've tried the k3m, too.
In my environment it first told me that my kernel is attackable.
I ran k3m a 2nd and 3rd time and it has only reported the "Child process started..." messages and produced child process zombies.
What is that? Is k3m buggy? Very strange...



-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Reply via email to