* ptrace/kmod exploit still works in 2.4.21?
@ 2003-06-18 11:22 Pete Taphouse
2003-06-18 11:38 ` Andre Tomt
0 siblings, 1 reply; 3+ messages in thread
From: Pete Taphouse @ 2003-06-18 11:22 UTC (permalink / raw)
To: linux-kernel
[-- Attachment #1: signed data --]
[-- Type: text/plain, Size: 949 bytes --]
Hi,
I've been doing some experiments with the 2.4.21 kernel, and the ptrace
exploit: the result of which is that I've compiled a kernel with the
processor set to i386. I then ran this kernel on 2 computers, one is a Duron
machine with SIS chipset, the other is a Pentium 4 machine with the Intel 845
chipset. The exploit still gave me a root shell on the Pentium 4 machine, but
didn't on the Duron one.
I've read the previous post about this, and in both cases I only logged in as
an unprivileged user. I didn't login as root and then su to an unprivileged
use first. I checked to see that I was root by opening /etc/shadow.
The exploit used was:
http://packetstormsecurity.nl/0304-exploits/ptrace-kmod.c
The config file for the kernel I compiled is at:
http://www.bytemark-hosting.co.uk/config.txt
Any ideas?
--
Peter Taphouse
Bytemark Hosting
http://www.bytemark-hosting.co.uk
tel. +44 (0) 8707 455 026
[-- Attachment #2: signature --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: ptrace/kmod exploit still works in 2.4.21?
2003-06-18 11:22 ptrace/kmod exploit still works in 2.4.21? Pete Taphouse
@ 2003-06-18 11:38 ` Andre Tomt
2003-06-18 12:36 ` Pete Taphouse
0 siblings, 1 reply; 3+ messages in thread
From: Andre Tomt @ 2003-06-18 11:38 UTC (permalink / raw)
To: Pete Taphouse; +Cc: linux-kernel
On ons, 2003-06-18 at 13:22, Pete Taphouse wrote:
<snip FAQ>
Check your exploit binary for the suid flag. If run successfully once on
a older kernel, it cheats by setting suid root.
--
Mvh,
André Tomt
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: ptrace/kmod exploit still works in 2.4.21?
2003-06-18 11:38 ` Andre Tomt
@ 2003-06-18 12:36 ` Pete Taphouse
0 siblings, 0 replies; 3+ messages in thread
From: Pete Taphouse @ 2003-06-18 12:36 UTC (permalink / raw)
To: Andre Tomt; +Cc: linux-kernel
[-- Attachment #1: signed data --]
[-- Type: text/plain, Size: 397 bytes --]
On Wednesday 18 June 2003 12:38, you wrote:
> On ons, 2003-06-18 at 13:22, Pete Taphouse wrote:
> <snip FAQ>
>
> Check your exploit binary for the suid flag. If run successfully once on
> a older kernel, it cheats by setting suid root.
Doh! Apologies for time/space wastage.
Cheers,
--
Peter Taphouse
Bytemark Hosting
http://www.bytemark-hosting.co.uk
tel. +44 (0) 8707 455 026
[-- Attachment #2: signature --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2003-06-18 12:22 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2003-06-18 11:22 ptrace/kmod exploit still works in 2.4.21? Pete Taphouse
2003-06-18 11:38 ` Andre Tomt
2003-06-18 12:36 ` Pete Taphouse
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).