[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Linux Kernel 2.x sock_sendpage() Local Ring0 Root Exploit

Author
spender
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-8060
Category
local exploits
Date add
13-08-2009
Platform
linux
=========================================================
Linux Kernel 2.x sock_sendpage() Local Ring0 Root Exploit
=========================================================


/* dedicated to my best friend in the whole world, Robin Price
   the joke is in your hands

   just too easy -- some nice library functions for reuse here though

   credits to julien tinnes/tavis ormandy for the bug

   may want to remove the __attribute__((regparm(3))) for 2.4 kernels,
   I have no time to test

spender@www:~$ cat redhat_hehe
I bet Red Hat will wish they closed the SELinux vulnerability when they
were given the opportunity to.  Now all RHEL boxes will get owned by
leeches.c :p

fd7810e34e9856f77cba67f291ba115f33411ebd 
d4b0e413ebf15d039953dfabf7f9a2d1

thanks to Dan Walsh for the great SELinux bypass even on "fixed" SELinux 
policies

and nice work Linus on trying to silently fix an 8 year old 
vulnerability, leaving vendors without patched kernels for their users.

  use ./wunderbar_emporium.sh for everything


*/

back: http://inj3ct0r.com/sploits/836.rar


#  0day.today [2024-12-24]  #