Could be a mistake from our side... the kernel wasn't the newest, but we are
building a new kernel at the moment... the only question is: what was the
way the exploid uses to come on the system ?


----- Original Message -----
From: "jwm" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, December 10, 2003 12:14 PM
Subject: RE: [hlds_linux] root-exploit through hlds?


> Sven <mailto:[EMAIL PROTECTED]> wrote:
> > The password for the console is definetly NOT in any log file
> > or something and totally different.
> > The rcon also was changed days before. I don't have any ideas...
> >
> > In fact that km3 (http://august.v-lo.krakow.pl/~anszom/km3.c)
> > was placed in the gameserver-directory and the user was the
> > local customer, finally the passwd was binded to the
> > gameserver ip and port (all gameservers have different ip's)
> > I think there is a connection between that.
> > Every customer have also different folders (gameserver, web and irc).
>
> Is your kernel patched against the very old kmod/ptrace-bug? Cause that's
> just what the exploit uses:
>
> /* lame, oversophisticated local root exploit for kmod/ptrace bug in linux
>  * 2.2 and 2.4
>  *
>  * have fun
>  */
>
> See also:
> -> http://www.kb.cert.org/vuls/id/176888
>
> jwm
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives,
please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to