Re: kernel module for chmod restrictions while in securelevel on

看板FB_security作者時間15年前 (2010/07/31 21:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串4/8 (看更多)
--+0mKm/ENadSkQxF+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Jul 31, 2010 at 01:59:43PM +0100, Istv??n wrote: > http://www.securiteam.com/exploits/6P00C00EKO.html This is an exploit for the archaic SA-05:02.sendfile. Op (semi-)obviously means exploit for the recent SA-10:07.mbuf, for which I am very curious whether the working exploit appeared in the wild. >=20 > On Sat, Jul 31, 2010 at 1:41 PM, Kostik Belousov <kostikbel@gmail.com>wro= te: >=20 > > On Fri, Jul 30, 2010 at 11:18:39PM -0700, Selphie Keller wrote: > > > Kernel module for chmod restrictions while in securelevel one or high= er: > > > http://gist.github.com/501800 (fbsd 8.x) > > > > > > Was looking at the new recent sendfile/mbuf exploit and it was using a > > > shellcode that calls chmod syscall to make a setuid/setgid binary. > > However > > Can you point to the exploit (code) ? > > >=20 >=20 >=20 > --=20 > the sun shines for all >=20 > http://l1xl1x.blogspot.com --+0mKm/ENadSkQxF+ Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (FreeBSD) iEYEARECAAYFAkxUH0oACgkQC3+MBN1Mb4ivegCfRB4VAekrICL9OY/nlBoTXHxC YYAAoLRcOLkD/RbxMi63FECo6flAdY+x =rjGO -----END PGP SIGNATURE----- --+0mKm/ENadSkQxF+--
文章代碼(AID): #1CL2NJGa (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1CL2NJGa (FB_security)