Full Disclosure mailing list archives

Re: Linux Kernel Exploit


From: highteck <highteck () hypershells com>
Date: Mon, 13 Dec 2010 12:37:23 -0500

On 13/12/2010 12:03 PM, highteck wrote:
root@bt:~# su test
sh-3.2$ cd /tmp
sh-3.2$ id;uname -a
uid=1000(test) gid=1000(test) groups=1000(test)
Linux bt 2.6.34 #1 SMP Wed Jul 21 09:51:09 EDT 2010 i686 GNU/Linux
sh-3.2$ ls
full-nelson.c
sh-3.2$ gcc full-nelson.c -o full-nelson
sh-3.2$ ./full-nelson
[*] Failed to open file descriptors.
sh-3.2$


(3:841)$ uname -a;id
Linux lemon 2.6.32.25-grsec-c0re #1 SMP Sat Nov 20 15:12:27 EST 2010 
i686 GNU/Linux
uid=1000(test) gid=1000(test) 
groups=1000(test,20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev)
(3:842)$ gcc full-nelson.c -o full-nelson
(3:843)$ ./full-nelson
[*] Failed to open file descriptors.



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: