Full Disclosure mailing list archives
Re: Local suid files and buffer overflows
From: Pieter de Boer <pieter () thedarkside nl>
Date: Sun, 09 Oct 2005 18:29:28 +0200
Werner Schalk wrote:
Now I exploited it using Aleph One's shellcode (see http://shellcode.org/shellcode/linux/null-free/) but I won't get a SUID shell afterwards (I know the exploit did work but I still have my normal user privleges). Why? I have tried a different shellcode to write a file and this file was root:root. Any ideas, hints, rtfm?Some shells (at least bash, that I know of) drop privileges when uid != euid. That's why I 'always' use zsh, which doesn't do that ;)
-- Pieter _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Local suid files and buffer overflows Werner Schalk (Oct 09)
- Re: Local suid files and buffer overflows Joachim Schipper (Oct 09)
- Re: Local suid files and buffer overflows Fósforo (Oct 09)
- Re: Local suid files and buffer overflows Pieter de Boer (Oct 09)
- Re: Local suid files and buffer overflows Eduardo Tongson (Oct 09)
- Re: Local suid files and buffer overflows Joachim Schipper (Oct 09)