Hi,
I've been doing some experiments with the 2.4.21 kernel, and the ptrace=20
exploit: the result of which is that I've compiled a kernel with the=20
processor set to i386. I then ran this kernel on 2 computers, one is a Dur=
on=20
machine with SIS chipset, the other is a Pentium 4 machine with the Intel 8=
45=20
chipset. The exploit still gave me a root shell on the Pentium 4 machine, b=
ut=20
didn't on the Duron one.
I've read the previous post about this, and in both cases I only logged in =
as=20
an unprivileged user. I didn't login as root and then su to an unprivilege=
d=20
use first. I checked to see that I was root by opening /etc/shadow.
The exploit used was:
http://packetstormsecurity.nl/0304-exploits/ptrace-kmod.c
The config file for the kernel I compiled is at:
http://www.bytemark-hosting.co.uk/config.txt
Any ideas?
=2D-=20
Peter Taphouse
Bytemark Hosting
http://www.bytemark-hosting.co.uk
tel. +44 (0) 8707 455 026
--Boundary-02=_jtE8+1f2PlSaype
Content-Type: application/pgp-signature
Content-Description: signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQA+8EtjIAZ7OKeBB58RAoLWAJ0UaxABVxCF8hr+zHZEtdgWPIRLGQCfVchC
vjgguI5GCGo6iIUqxY1HGfU=
=hcxZ
-----END PGP SIGNATURE-----
--Boundary-02=_jtE8+1f2PlSaype--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/