Hunger schreef op 2013-06-19 23:32:
$ uname -a FreeBSD fbsd91x64 9.1-RELEASE FreeBSD 9.1-RELEASE #0 r243825: Tue Dec 4 09:23:10 UTC 2012 root@xxxxxxxxxxxxxxxxxxxxxxx:/usr/obj/usr/src/sys/GENERIC amd64 $ id uid=1001(hunger) gid=1002(hunger) groups=1002(hunger) $ gcc fbsd9lul.c -o fbsd9lul $ ./fbsd9lul FreeBSD 9.{0,1} mmap/ptrace exploit by Hunger <fbsd9lul@xxxxxxxxx> # id uid=0(root) gid=0(wheel) egid=1002(hunger) groups=1002(hunger) #
FreeBSD nergal.ninth-circle-alliance.net 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #0: Mon Jun 17 11:42:37 UTC 2013 root@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx:/usr/obj/usr/src/sys/GENERIC amd64uname -a
./fbsd9lul
FreeBSD 9.{0,1} mmap/ptrace exploit by Hunger <fbsd9lul () hunger hu> fbsd9lul: ptio: Bad address Vuln is already patched and available in freebsd-update. Cheers, Emiel