Re: kernel module for chmod restrictions while in securelevel on
--+0mKm/ENadSkQxF+
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Sat, Jul 31, 2010 at 01:59:43PM +0100, Istv??n wrote:
> http://www.securiteam.com/exploits/6P00C00EKO.html
This is an exploit for the archaic SA-05:02.sendfile. Op (semi-)obviously
means exploit for the recent SA-10:07.mbuf, for which I am very
curious whether the working exploit appeared in the wild.
>=20
> On Sat, Jul 31, 2010 at 1:41 PM, Kostik Belousov <kostikbel@gmail.com>wro=
te:
>=20
> > On Fri, Jul 30, 2010 at 11:18:39PM -0700, Selphie Keller wrote:
> > > Kernel module for chmod restrictions while in securelevel one or high=
er:
> > > http://gist.github.com/501800 (fbsd 8.x)
> > >
> > > Was looking at the new recent sendfile/mbuf exploit and it was using a
> > > shellcode that calls chmod syscall to make a setuid/setgid binary.
> > However
> > Can you point to the exploit (code) ?
> >
>=20
>=20
>=20
> --=20
> the sun shines for all
>=20
> http://l1xl1x.blogspot.com
--+0mKm/ENadSkQxF+
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (FreeBSD)
iEYEARECAAYFAkxUH0oACgkQC3+MBN1Mb4ivegCfRB4VAekrICL9OY/nlBoTXHxC
YYAAoLRcOLkD/RbxMi63FECo6flAdY+x
=rjGO
-----END PGP SIGNATURE-----
--+0mKm/ENadSkQxF+--
討論串 (同標題文章)
完整討論串 (本文為第 4 之 8 篇):