Exploit published for FreeBSD local root vulnerability

  • Thread starter Thread starter Anonymous
  • Start date Start date
Oh wow interesting. Is the patch in 8.0-STABLE yet? Or has the sec. advisory been announced yet? This is interesting/bad. :(
 
CodeBlock said:
Oh wow interesting. Is the patch in 8.0-STABLE yet? Or has the sec. advisory been announced yet? This is interesting/bad. :(

Yeah, it's in 8-STABLE. I rebuilt a few hours ago, and the exploit doesn't seem to work anymore.
 
Runs successfully on 8.0 RC1.
**************************************************
**** DOES NOT AFFECT FreeBSD 8.0-CURRENT-200902 ****
**************************************************
Request everyone to check if they have 8.0's Pre Releases.
Would be intersting to check the pre-release source (/usr/src/libexec/rtld-elf/rtld.c) with the
temporary patch provided.

Since /sbin/ping has been execl-ed in the code, on exitting the root shell it (echoes out) teaches the usage of ping to the exploiter :-)
 
quakerdoomer said:
Since /sbin/ping has been execl-ed in the code, on exitting the root shell it (echoes out) teaches the usage of ping to the exploiter :-)
Yes, but do note it's not ping that's the problem. Any suid root program could be used for this.
 
Back
Top