[ad]
A working version of the exploit used to escalate privileges to root in the recent Debian breakin, ah another root kernel exploit.
It’s to do with the way the kernel handles file permissions (or lack of) on core dumps.
Linux kernel is prone to a local privilege-escalation vulnerability.
A local attacker may gain elevated privileges by creating a coredump file in a directory that they do not have write access to.
A successful attack may result in a complete compromise.
Linux kernel versions prior to 2.6.17.4 are vulnerable.
/*****************************************************/
/* Local r00t Exploit for: */
/* Linux Kernel PRCTL Core Dump Handling */
/* ( BID 18874 / CVE-2006-2451 ) */
/* Kernel 2.6.x (>= 2.6.13 && < 2.6.17.4) */
/* By: */
/* - dreyer
/* - RoMaNSoFt
/* [ 10.Jul.2006 ] */
/*****************************************************/
#include stdio.h
#include sys/time.h
#include sys/resource.h
#include unistd.h
#include linux/prctl.h
#include stdlib.h
#include sys/types.h
#include signal.h
You can download it here:
Silahsiz Kuvvetler says
this exploit is not bad but it is not the best too…but you published the little part of it..it’s not whole
darren says
Silahsiz Kuvvetler which one do you use?