Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump

2006-07-14 Thread cyberfox2002
/*//* Local r00t Exploit for: *//* Linux Kernel PRCTL Core Dump Handling *//* ( BID 18874 / CVE-2006-2451 ) *//* Kernel 2.6.x (= 2.6.13 2.6.17.4) *//* By: *//* - dreyer [EMAIL PROTECTED] (main PoC code) *//* - RoMaNSoFt [EMAIL

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump

2006-07-14 Thread Sven Wegener
On Fri, Jul 14, 2006 at 05:08:58PM +0800, cyberfox2002 wrote: I have a question. why the payload is not being used in the exploit? The author erased it purposively?? The payload is not being used in the program itself, but it will be included in the created coredump and the cron daemon will

Re: [Full-disclosure] Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know

2006-07-14 Thread Andre Gagne
From the list charter, Gratuitous advertisement, product placement, or self-promotion is forbidden. I feel that you're boarder-line here, others may feel differently. If you want testers, try contacting people individually. And no, I don't have enough experience to try and crack it. Just

Re: [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling - simple workaround

2006-07-14 Thread Jon Hart
On Thu, Jul 13, 2006 at 09:57:05PM -0700, Kyle Lutze wrote: it seems that this relies on /etc/cron.d being there? or is it specific to a crond? I use fcron which doesn't use /etc/cron.d and I have been unable to get the exploit to successfully work. 2.6.14 kernel sh: /tmp/sh: No such file or

[Full-disclosure] Microsoft PowerPoint 0-day Vulnerability FAQ document written

2006-07-14 Thread Juha-Matti Laurio
I have written FAQ document including 33 items about the recently reported 0-day vulnerability in PowerPoint. This vulnerability is being exploited by Trojan horse including keylogger features. The document entitled as Microsoft PowerPoint 0-day Vulnerability FAQ is located at my SecuriTeam

[Full-disclosure] EEYE: McAfee ePolicy Orchestrator Remote Compromise

2006-07-14 Thread eEye Advisories
McAfee ePolicy Orchestrator Remote Compromise Release Date: July 13, 2006 Severity: High (Remote Code Execution) Vendor: McAfee Systems Affected: McAfee Common Management (EPO) Agent versions below version 3.5.5.438 Overview: McAfee ePolicy Orchestrator is the remote security management

Re: [Full-disclosure] 70 million computers are using Windows 98rightnow

2006-07-14 Thread bkfsec
Castigliola, Angelo wrote: significantly lowering risk and still enjoy the feature rich functionality that IE offers. I stopped reading here. You're either joking, or trolling... because no sane person would make this statement. Feature rich? Man, are you all there mentally? Do you

Re: [Full-disclosure] 70 million computers are using Windows 98rightnow

2006-07-14 Thread bkfsec
Castigliola, Angelo wrote: What you missed in my previous note is that I am simply not referring to only websites but web applications also, specificity .NET web applications. When I refer to feature rich I am speaking of things such as view state, output caching, client-side validation,

[Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Joanna R.
Hello,attached 0day kernel 2.6 local root exploit. This is a new genuine bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it is only used to change process status.The code exploits a root race in /prochave a nice day. All new Yahoo! Mail "The new Interface is stunning in its

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread James Lay
On Fri, 14 Jul 2006 21:35:17 +0100 (BST) Joanna R. [EMAIL PROTECTED] wrote: Hello, attached 0day kernel 2.6 local root exploit. This is a new genuine bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it is only used to change process status. The code exploits a root race

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Rodrigo Barbosa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Fri, Jul 14, 2006 at 09:35:17PM +0100, Joanna R. wrote: Hello, attached 0day kernel 2.6 local root exploit. This is a new genuine bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it is only used to change process status.

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Joanna R.
you need a.out support in kernel for the c0de to work but the bug can be exploited otherwise. All new Yahoo! Mail "The new Interface is stunning in its simplicity and ease of use." - PC Magazine___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread James Lay
On Fri, 14 Jul 2006 21:58:01 +0100 (BST) Joanna R. [EMAIL PROTECTED] wrote: you need a.out support in kernel for the c0de to work but the bug can be exploited otherwise. [15:12:45 [EMAIL PROTECTED]:~/src/linux$] grep -i out .config CONFIG_BINFMT_AOUT=y It is =) James

[Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Joanna R.
[15:12:45 me at homebox:~/src/linux$] grep -i out .config CONFIG_BINFMT_AOUT=y It is =) James you are obviously unable to run it given even a fully functioning exploit code. please stop reading this list :-]

[Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Joanna R.
here again the c0de in body - I dunno whether it made it through the scrubbing. Normally I use telnet to SMTP port to write mails so I'm pretty lost using yahoo. apologise for incovenience. -- cut -- /* ** Author: h00lyshit ** Vulnerable: Linux 2.6 ALL **

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Dan B
Hello, Joanna R. wrote: Hello, attached 0day kernel 2.6 local root exploit. This is a new genuine bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it is only used to change process status. Tested on [EMAIL PROTECTED] ~ $ uname -a Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Jeff D
Joanna R. wrote: Hello, attached 0day kernel 2.6 local root exploit. This is a new genuine bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it is only used to change process status. The code exploits a root race in /proc have a nice day.

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread James Lay
On Fri, 14 Jul 2006 22:29:23 +0100 (BST) Joanna R. [EMAIL PROTECTED] wrote: [15:12:45 me at homebox:~/src/linux$] grep -i out .config CONFIG_BINFMT_AOUT=y It is =) James you are obviously unable to run it given even a fully functioning exploit code. please stop reading this list :-]

RE: [Full-disclosure] Looking for any vulnerabilities in GreenBorder Pro - Download please, and let me know

2006-07-14 Thread Bill Stout
Hi Andre, Thanks, though I'm not promoting, rather I'm looking for problems. I should've left out the count, when I tried to explain the continued free license. Trust me, the company I work for would rather me NOT ask for vulnerabilities on public lists. My habit is to find problems sooner

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Rodriguez [ackstorm]
El vie, 14-07-2006 a las 23:55 +0200, Dan B escribió: Hello, Joanna R. wrote: Hello, attached 0day kernel 2.6 local root exploit. This is a new genuine bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it is only used to change process status. Tested on 2.6.17.4 -

[Full-disclosure] ................................................................................................................................................................

2006-07-14 Thread Matthew Murphy Is an HIV Jiggaboo
Hezbollah is ready for open LOLs on Matthew Murphy. Matthew Murphy has AIDS and Asperger's Syndrome. Matthew Murphy has sexual relations with his cousin. ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] ...................oo.......................ooo.................oOoo.......oOO...................................................................

2006-07-14 Thread Matthew Murphy Is an HIV Jiggaboo
Hezbollah is ready for open LOLs on Matthew Murphy. Matthew Murphy has AIDS and Asperger's Syndrome. Matthew Murphy has sexual relations with his cousin. ___ Full-Disclosure - We believe in it. Charter:

[Full-disclosure] Linux Privilege Escalation exploits

2006-07-14 Thread David Taylor
I know various security research sites that release advisories on new vulnerabilities have their own way they determine what is critical or not. Privilege escalation exploits are usually local and require a local account to exploit. So, it seems that security research sites label these as 'less

Re: [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your fingers

2006-07-14 Thread Brian Jung Myeng Lee
This doesn't work on Ubuntu 6.06 LTS. [EMAIL PROTECTED]:~/tmp$ uname -a Linux ubuntu 2.6.15-26-386 #1 PREEMPT Fri Jul 7 19:27:00 UTC 2006 i686 GNU/[EMAIL PROTECTED]:~/tmp$ ./a.out /nfs/hd2/movies/Fight.Club.1999.avi preparing trying to exploit /nfs/hd2/movies/Fight.Club.1999.avi sh-3.1$ whoami

Re: [Full-disclosure] Linux Privilege Escalation exploits

2006-07-14 Thread Valdis . Kletnieks
On Fri, 14 Jul 2006 22:35:27 EDT, David Taylor said: I'm just thinking that people aren't looking at the big picture when they rate these vulnerabilities. 3/4 of the people in the security industry couldn't see the big picture if you crazy-glued it to the inside of their eyelids - they're too