Larry Nguyen wrote:
> In case ba'c na`o missed it from bugtrag.  Xem solution ta.m o+? cuo^'i thu+.
> 
> -Larry

Fake one. Don't run it!

> 
>         ------  Original Message  ------
> Subject: Undisclosed Sudo Vulnerability ?
> To:      bugtraq@securityfocus.com
> Date:    Sat, 30 Jul 2005 12:40:23 -0600
> 
> 
> About two weeks ago, our proprietary LIDS detected some suspicious shell
> activity on an internal .mil machine i am in charged of. Our server runs
> latest up2date Debian GNU/Linux on 2.4.31 x86 with grsec/PaX enabled.
> Before shutting down the machine and reinstalling it from scratch, we
> installed sebek module to monitor all shell activity. Based on the data
> we gathered, it seems the attacker gained root privileges using an
> undisclosed bug in latest sudo.
> 
> ...
> 
> $ cat sudoh.c
> /*
>  *  off by one ebp overwrite in sudo prompt parsing func (bground mode only)
>  *
>  *  "y0, don't abuse this priv8 exploit to rm boxes. k,thx" - Richard Johnson
>  *
>  *  gcc -pipe -o sudoh sudoh.c ; ./sudoh
>  *
>  *  happy deathday route
>  *
>  */


-------------------------------------------------------
SF.Net email is Sponsored by the Better Software Conference & EXPO
September 19-22, 2005 * San Francisco, CA * Development Lifecycle Practices
Agile & Plan-Driven Development * Managing Projects & Teams * Testing & QA
Security * Process Improvement & Measurement * http://www.sqe.com/bsce5sf
_______________________________________________
VietLUG-users mailing list
VietLUG-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/vietlug-users

Trả lời cho