linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* ptrace/kmod exploit still works in 2.4.21?
@ 2003-06-18 11:22 Pete Taphouse
  2003-06-18 11:38 ` Andre Tomt
  0 siblings, 1 reply; 3+ messages in thread
From: Pete Taphouse @ 2003-06-18 11:22 UTC (permalink / raw)
  To: linux-kernel

[-- Attachment #1: signed data --]
[-- Type: text/plain, Size: 949 bytes --]

Hi,

I've been doing some experiments with the 2.4.21 kernel, and the ptrace 
exploit: the result of which is that I've compiled a kernel with the 
processor set to i386.  I then ran this kernel on 2 computers, one is a Duron 
machine with SIS chipset, the other is a Pentium 4 machine with the Intel 845 
chipset. The exploit still gave me a root shell on the Pentium 4 machine, but 
didn't on the Duron one.

I've read the previous post about this, and in both cases I only logged in as 
an unprivileged user.  I didn't login as root and then su to an unprivileged 
use first. I checked to see that I was root by opening /etc/shadow.

The exploit used was:
http://packetstormsecurity.nl/0304-exploits/ptrace-kmod.c

The config file for the kernel I compiled is at:
http://www.bytemark-hosting.co.uk/config.txt

Any ideas?

-- 
Peter Taphouse

Bytemark Hosting
http://www.bytemark-hosting.co.uk
tel. +44 (0) 8707 455 026

[-- Attachment #2: signature --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: ptrace/kmod exploit still works in 2.4.21?
  2003-06-18 11:22 ptrace/kmod exploit still works in 2.4.21? Pete Taphouse
@ 2003-06-18 11:38 ` Andre Tomt
  2003-06-18 12:36   ` Pete Taphouse
  0 siblings, 1 reply; 3+ messages in thread
From: Andre Tomt @ 2003-06-18 11:38 UTC (permalink / raw)
  To: Pete Taphouse; +Cc: linux-kernel

On ons, 2003-06-18 at 13:22, Pete Taphouse wrote:
<snip FAQ>

Check your exploit binary for the suid flag. If run successfully once on
a older kernel, it cheats by setting suid root.

-- 
Mvh,
André Tomt


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: ptrace/kmod exploit still works in 2.4.21?
  2003-06-18 11:38 ` Andre Tomt
@ 2003-06-18 12:36   ` Pete Taphouse
  0 siblings, 0 replies; 3+ messages in thread
From: Pete Taphouse @ 2003-06-18 12:36 UTC (permalink / raw)
  To: Andre Tomt; +Cc: linux-kernel

[-- Attachment #1: signed data --]
[-- Type: text/plain, Size: 397 bytes --]

On Wednesday 18 June 2003 12:38, you wrote:
> On ons, 2003-06-18 at 13:22, Pete Taphouse wrote:
> <snip FAQ>
>
> Check your exploit binary for the suid flag. If run successfully once on
> a older kernel, it cheats by setting suid root.
Doh!  Apologies for time/space wastage.

Cheers,
-- 
Peter Taphouse

Bytemark Hosting
http://www.bytemark-hosting.co.uk
tel. +44 (0) 8707 455 026

[-- Attachment #2: signature --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2003-06-18 12:22 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2003-06-18 11:22 ptrace/kmod exploit still works in 2.4.21? Pete Taphouse
2003-06-18 11:38 ` Andre Tomt
2003-06-18 12:36   ` Pete Taphouse

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).