> hello!
>
> the problem:
> i tried an exploit (url given below) with debian woody kernel 2.4.18
> and self compiled kernel 2.4.21 resulting in a root shell.
>
> exploit code url: (found via google)
> http://isec.pl/cliph/isec-ptrace-kmod-exploit.c
>
> as described in the source the exploit uses the well known ptrace bug
> which i thought was fixed in kernel 2.4.21.
>
> i don't know why it still works or how to fix it. i told someone people
> in #debian.de (quakenet) about the results of the exploit and they
> asked me to post a bug report here.
The binary is 4755 (SUID!) What do you expect. Delete it and
recompile from a non-root account.
Cheers,
Dick Johnson
Penguin : Linux version 2.4.20 on an i686 machine (797.90 BogoMips).
Why is the government concerned about the lunatic fringe? Think about it.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/