Full Disclosure mailing list archives

Re: Re: Linux kernel do_mremap() proof-of-concept exploit code


From: backblue <backblue () netcabo pt>
Date: Tue, 6 Jan 2004 20:34:00 +0000

On Tue, 6 Jan 2004 11:47:26 -0700
"Epic" <epic () hack3r com> wrote:

I too tested it on my 2.4.23 kernel with grsec, and nothing.


----- Original Message ----- 
From: "Daniel Husand" <io () naiv us>
To: <full-disclosure () lists netsys com>
Sent: Tuesday, January 06, 2004 10:54 AM
Subject: [Full-disclosure] Re: Linux kernel do_mremap() proof-of-concept
exploit code


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Christophe Devine wrote:

| The following program can be used to test if a x86 Linux system
| is vulnerable to the do_mremap() exploit; use at your own risk.
|
| $ cat mremap_poc.c
|

This didnt do anything on my 2.4.23-grsec kernel.

- --
Daniel
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQE/+vZz1PIgHh6MkiIRAiqNAKCiuyxtA9rgaAS+eT3o9ATvLE7EuQCeJAZP
Xf8JIDehgtGba4b1Eb2Qv0w=
=xyYM
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Offcourse not! that exploit was not made for kernels with grsec and another kernel with patch's similar to that one! 
but it is vuln anyway, just code you the exploit for the grsec kernel!
you have to pass a coulple of things over...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: