Hello, Joanna R. wrote: > Hello, > > attached 0day kernel 2.6 local root exploit. This is a new genuine > bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it > is only used to change process status. Tested on
[EMAIL PROTECTED] ~ $ uname -a Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9 16:44:22 CEST 2006 i686 Intel(R) Pentium(R) M processor 2.00GHz GNU/Linux [EMAIL PROTECTED] ~ $ ./h00lyshit ./Media/Audio/DnB/TheEngineer_060331.mp3 preparing trying to exploit ./Media/Audio/DnB/TheEngineer_060331.mp3 sh-3.1# id uid=0(root) gid=100(users) groups=7(lp),10(wheel),18(audio),27(video),35(games),81(apache),100(users),7353(svnusers) sh-3.1# whoami root sh-3.1# > The code exploits a root race in /proc So it does :) > > have a nice day. But this means that I've gotta worry about more servers now! Dam it! And is there a workaround to protect against this attack? Cheers, Dan. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
