Full Disclosure mailing list archives

Re: 0day LINUX 0day LATEST


From: Andrew Farmer <andfarm () gmail com>
Date: Mon, 28 Jan 2008 02:55:16 -0800

On 28 Jan 08, at 02:13, wejwklekl246 wrote:
/* !!PRIVATE !!PRIVATE !!PRIVATE !!PRIVATE !!PRIVATE !!PRIVATE
*
* afunixroot.c Linux kernel 2.6.x i386 local root exploit

<blah blah blah>

Compiles a shared library in /tmp/own.so containing the functions

        int getuid() { return 0; }
        int geteuid() { return 0; }
        int getgid() { return 0; }
        int getegid() { return 0; }

and executes /bin/sh with LD_PRELOAD=/tmp/own.so

Pretty lame. Protip: "hellc0de" containing lots of \x61-\x7f looks fake.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: