Linux Kernel 2.x sock_sendpage() Local Ring0 Root Exploit 's

admin 2017年5月4日22:52:49评论364 views字数 891阅读2分58秒阅读模式
摘要

/* dedicated to my best friend in the whole world, Robin Price
the joke is in your handsjust too easy — some nice library functions for reuse here though

/* dedicated to my best friend in the whole world, Robin Price
the joke is in your hands

just too easy — some nice library functions for reuse here though

credits to julien tinnes/tavis ormandy for the bug

may want to remove the __attribute__((regparm(3))) for 2.4 kernels, I have no time to test

[email protected]:~$ cat redhat_hehe
I bet Red Hat will wish they closed the SELinux vulnerability when they were given the opportunity to. Now all RHEL boxes will get owned by leeches.c :p

fd7810e34e9856f77cba67f291ba115f33411ebd
d4b0e413ebf15d039953dfabf7f9a2d1

thanks to Dan Walsh for the great SELinux bypass even on “fixed” SELinux
policies

and nice work Linus on trying to silently fix an 8 year old vulnerability, leaving vendors without patched kernels for their users.

use ./wunderbar_emporium.sh for everything

don’t have mplayer? watch an earlier version of the exploit at:

*/

http://www.grsecurity.net/~spender/wunderbar_emporium.tgz
back: http://milw0rm.com/sploits/2009-wunderbar_emporium.tgz

# milw0rm.com [2009-08-14]

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年5月4日22:52:49
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Linux Kernel 2.x sock_sendpage() Local Ring0 Root Exploit 'shttps://cn-sec.com/archives/44866.html

发表评论

匿名网友 填写信息