On Tue, 6 Jan 2004 11:47:26 -0700
"Epic" <[EMAIL PROTECTED]> wrote:

> I too tested it on my 2.4.23 kernel with grsec, and nothing.
> 
> 
> ----- Original Message ----- 
> From: "Daniel Husand" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Tuesday, January 06, 2004 10:54 AM
> Subject: [Full-Disclosure] Re: Linux kernel do_mremap() proof-of-concept
> exploit code
> 
> 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > Christophe Devine wrote:
> >
> > | The following program can be used to test if a x86 Linux system
> > | is vulnerable to the do_mremap() exploit; use at your own risk.
> > |
> > | $ cat mremap_poc.c
> > |
> >
> > This didnt do anything on my 2.4.23-grsec kernel.
> >
> > - --
> > Daniel
> > -----BEGIN PGP SIGNATURE-----
> > Version: GnuPG v1.2.3 (MingW32)
> > Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
> >
> > iD8DBQE/+vZz1PIgHh6MkiIRAiqNAKCiuyxtA9rgaAS+eT3o9ATvLE7EuQCeJAZP
> > Xf8JIDehgtGba4b1Eb2Qv0w=
> > =xyYM
> > -----END PGP SIGNATURE-----
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Offcourse not! that exploit was not made for kernels with grsec and another kernel 
with patch's similar to that one! but it is vuln anyway, just code you the exploit for 
the grsec kernel!
you have to pass a coulple of things over...

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to