Could be a mistake from our side... the kernel wasn't the newest, but we are building a new kernel at the moment... the only question is: what was the way the exploid uses to come on the system ?
----- Original Message ----- From: "jwm" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, December 10, 2003 12:14 PM Subject: RE: [hlds_linux] root-exploit through hlds? > Sven <mailto:[EMAIL PROTECTED]> wrote: > > The password for the console is definetly NOT in any log file > > or something and totally different. > > The rcon also was changed days before. I don't have any ideas... > > > > In fact that km3 (http://august.v-lo.krakow.pl/~anszom/km3.c) > > was placed in the gameserver-directory and the user was the > > local customer, finally the passwd was binded to the > > gameserver ip and port (all gameservers have different ip's) > > I think there is a connection between that. > > Every customer have also different folders (gameserver, web and irc). > > Is your kernel patched against the very old kmod/ptrace-bug? Cause that's > just what the exploit uses: > > /* lame, oversophisticated local root exploit for kmod/ptrace bug in linux > * 2.2 and 2.4 > * > * have fun > */ > > See also: > -> http://www.kb.cert.org/vuls/id/176888 > > jwm > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds_linux > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds_linux