Current time: 04-19-2024, 03:31 AM Hello There, Guest! (LoginRegister)


Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
blöder root-exploit...
Author Message
tomhb Offline
Member
***

Posts: 336
Joined: Apr 2010
Reputation: 4
Post: #1
blöder root-exploit...
Moin,

Vielleicht interessiert es ja den ein oder andren:

http://www.heise.de/newsticker/meldung/L...19608.html


Wenn man seinen Kernel mit grsecurity (http://grsecurity.net/) gepatched hat,
passiert da nix, siehe:

Code:
tom@myhost:/data$ uname- a
Linux myhost 3.2.1-grsec #4 SMP Wed Jan 25 00:40:22 CET 2012 x86_64 GNU/Linux

tom@myhost:/data$ id
uid=1000(tom) gid=1000(tom) Gruppen=1000(tom),...,1008(grsec),

tom@myhost:/data$ ./mempodipper
===============================
=          Mempodipper        =
=           by zx2c4          =
=         Jan 21, 2012        =
===============================

[+] Waiting for transferred fd in parent.
[+] Executing child from child fork.
[+] Opening parent mem /proc/3620/mem in child.
[-] open: Permission denied

^C

Ohne grsec hat man auf einem Debian GNU/Linux innerhalb einiger
Sekunden eine rootshell.

gruss tom
(This post was last modified: 01-25-2012 10:07 AM by tomhb.)
01-25-2012 10:06 AM
Find all posts by this user Quote this message in a reply
Post Reply 


Messages In This Thread
blöder root-exploit... - tomhb - 01-25-2012 10:06 AM
RE: blöder root-exploit... - tomdooley - 01-27-2012, 05:50 AM
RE: blöder root-exploit... - tomhb - 01-27-2012, 11:21 AM

Forum Jump:


User(s) browsing this thread: 1 Guest(s)