Re: [Full-disclosure] Linux kernel exploit

From: niklas|brueckenschlaeger <niklas@brueckenschlaeger.de>
To: Kai <kai@rhynn.net>
Cc: Cal Leeming [Simplicity Media Ltd] <cal.leeming@simplicitymedialtd.co.uk>,full-disclosure@lists.grok.org.uk,bugtraq@securityfocus.com
Subject: Re: [Full-disclosure] Linux kernel exploit
Date:


Debian lenny:

  niklas@sandbox:~$ uname -a
  Linux sandbox 2.6.26-2-amd64 #1 SMP Thu Sep 16 15:56:38 UTC 2010
x86_64 GNU/Linux
  niklas@sandbox:~$ make full-nelson
  cc     full-nelson.c   -o full-nelson
  niklas@sandbox:~$ ./full-nelson
  [*] Resolving kernel addresses...
   [+] Resolved econet_ioctl to 0xffffffffa01d319b
   [+] Resolved econet_ops to 0xffffffffa01d41e0
  [*] Failed to resolve kernel symbols.


On Wed, 2010-12-08 at 00:44 +0300, Kai wrote:
> > Anyone tested this in sandbox yet?
> 
> 00:37 linups:../expl/kernel > cat /etc/*release*
> openSUSE 11.3 (i586)
> VERSION = 11.3
> 00:37 linups:../expl/kernel > uname -r
> 2.6.34.4-0.1-desktop
> 00:37 linups:../expl/kernel > gcc _2.6.37.local.c -o test
> 00:37 linups:../expl/kernel > ./test
> [*] Failed to open file descriptors.
> 






Copyright © 1995-2018 LinuxRocket.net. All rights reserved.